diff options
| author | Andrey Konovalov | 2021-08-31 22:48:23 +0200 |
|---|---|---|
| committer | Andrey Konovalov | 2021-09-01 15:58:29 +0200 |
| commit | 136d14d155eb1ef99a9103f9f91c55ac1103f45b (patch) | |
| tree | eee3c4bc3481a99dd618cd320188726555d0bc59 /README.md | |
| parent | 5ff25e64c10b71cc1d3a2f690fdf94e94a330f26 (diff) | |
July/August updates
Diffstat (limited to 'README.md')
| -rw-r--r-- | README.md | 46 |
1 files changed, 43 insertions, 3 deletions
| @@ -3,10 +3,12 @@ Linux Kernel Exploitation | |||
| 3 | 3 | ||
| 4 | A collection of links related to Linux kernel security and exploitation. | 4 | A collection of links related to Linux kernel security and exploitation. |
| 5 | 5 | ||
| 6 | Pull requests are welcome. | 6 | Updated bimonthly. Pull requests are welcome as well. |
| 7 | 7 | ||
| 8 | Follow [@andreyknvl](https://twitter.com/andreyknvl) on Twitter to be notified of updates. | 8 | Follow [@andreyknvl](https://twitter.com/andreyknvl) on Twitter to be notified of updates. |
| 9 | 9 | ||
| 10 | Subscribe to [@linkersec](https://t.me/linkersec) on Telegram for highlights. | ||
| 11 | |||
| 10 | 12 | ||
| 11 | ## Contents | 13 | ## Contents |
| 12 | 14 | ||
| @@ -224,6 +226,8 @@ Follow [@andreyknvl](https://twitter.com/andreyknvl) on Twitter to be notified o | |||
| 224 | 226 | ||
| 225 | ### Info-leaks | 227 | ### Info-leaks |
| 226 | 228 | ||
| 229 | [2021: "Samsung S10+/S9 kernel 4.14 (Android 10) Kernel Function Address (.text) and Heap Address Information Leak"](https://ssd-disclosure.com/ssd-advisory-samsung-s10-s9-kernel-4-14-android-10-kernel-function-address-text-and-heap-address-information-leak/) [article, CVE-TBD] | ||
| 230 | |||
| 227 | [2021: "Linux Kernel /proc/pid/syscall information disclosure vulnerability"](https://talosintelligence.com/vulnerability_reports/TALOS-2020-1211) [article] [CVE-2020-28588] | 231 | [2021: "Linux Kernel /proc/pid/syscall information disclosure vulnerability"](https://talosintelligence.com/vulnerability_reports/TALOS-2020-1211) [article] [CVE-2020-28588] |
| 228 | 232 | ||
| 229 | [2021: "Spectre exploits in the "wild""](https://dustri.org/b/spectre-exploits-in-the-wild.html) [article] | 233 | [2021: "Spectre exploits in the "wild""](https://dustri.org/b/spectre-exploits-in-the-wild.html) [article] |
| @@ -257,6 +261,22 @@ Follow [@andreyknvl](https://twitter.com/andreyknvl) on Twitter to be notified o | |||
| 257 | 261 | ||
| 258 | ### LPE | 262 | ### LPE |
| 259 | 263 | ||
| 264 | [2021: "Kernel Pwning with eBPF: a Love Story" by Valentina Palmiotti](https://www.graplsecurity.com/post/kernel-pwning-with-ebpf-a-love-story) [article, CVE-2021-3490] | ||
| 265 | |||
| 266 | [2021: "The Art of Exploiting UAF by Ret2bpf in Android Kernel" by Xingyu Jin and Richard Neal](https://conference.hitb.org/hitbsecconf2021sin/materials/D1T1%20-%20%20The%20Art%20of%20Exploiting%20UAF%20by%20Ret2bpf%20in%20Android%20Kernel%20-%20Xingyu%20Jin%20&%20Richard%20Neal.pdf) [slides, CVE-2021-0399] | ||
| 267 | |||
| 268 | [2021: "Internal of the Android kernel backdoor vulnerability"](https://vul.360.net/archives/263) [article, CVE-2021-28663] | ||
| 269 | |||
| 270 | [2021: "Escape from chrome sandbox to root"](https://vul.360.net/archives/217) [article, CVE-2020-0423] | ||
| 271 | |||
| 272 | [2021: "CVE-2017-11176" by Maher Azzouzi](https://github.com/MaherAzzouzi/LinuxKernelStudy/tree/main/CVE-2017-11176) [article] [CVE-2017-11176] | ||
| 273 | |||
| 274 | [2021: "Sequoia: A deep root in Linux's filesystem layer (CVE-2021-33909)" by Qualys Research Team](https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt) [article, CVE-2021-33909] | ||
| 275 | |||
| 276 | [2021: "CVE-2021-22555: Turning \x00\x00 into 10000$" by Andy Nguyen](https://google.github.io/security-research/pocs/linux/cve-2021-22555/writeup.html) [CVE-2021-22555, article] | ||
| 277 | |||
| 278 | [2021: "Exploitation of a double free vulnerability in Ubuntu shiftfs driver (CVE-2021-3492)" by Vincent Dehors](https://www.synacktiv.com/publications/exploitation-of-a-double-free-vulnerability-in-ubuntu-shiftfs-driver-cve-2021-3492.html) [article, CVE-2021-3492] | ||
| 279 | |||
| 260 | [2021: "CVE-2021-20226 a reference counting bug which leads to local privilege escalation in io_uring"](https://flattsecurity.medium.com/cve-2021-20226-a-reference-counting-bug-which-leads-to-local-privilege-escalation-in-io-uring-e946bd69177a) [article] [CVE-2021–20226] | 280 | [2021: "CVE-2021-20226 a reference counting bug which leads to local privilege escalation in io_uring"](https://flattsecurity.medium.com/cve-2021-20226-a-reference-counting-bug-which-leads-to-local-privilege-escalation-in-io-uring-e946bd69177a) [article] [CVE-2021–20226] |
| 261 | 281 | ||
| 262 | [2021: "CVE-2021-32606: CAN ISOTP local privilege escalation"](https://github.com/nrb547/kernel-exploitation/blob/main/cve-2021-32606/cve-2021-32606.md) [article] [CVE-2021-32606] | 282 | [2021: "CVE-2021-32606: CAN ISOTP local privilege escalation"](https://github.com/nrb547/kernel-exploitation/blob/main/cve-2021-32606/cve-2021-32606.md) [article] [CVE-2021-32606] |
| @@ -275,6 +295,10 @@ Follow [@andreyknvl](https://twitter.com/andreyknvl) on Twitter to be notified o | |||
| 275 | 295 | ||
| 276 | [2021: "Four Bytes of Power: exploiting CVE-2021-26708 in the Linux kernel"](https://a13xp0p0v.github.io/2021/02/09/CVE-2021-26708.html) [article] [[slides](https://a13xp0p0v.github.io/img/CVE-2021-26708.pdf)] [[video](https://www.youtube.com/watch?v=EMcjHfceX44)] [CVE-2021-26708] | 296 | [2021: "Four Bytes of Power: exploiting CVE-2021-26708 in the Linux kernel"](https://a13xp0p0v.github.io/2021/02/09/CVE-2021-26708.html) [article] [[slides](https://a13xp0p0v.github.io/img/CVE-2021-26708.pdf)] [[video](https://www.youtube.com/watch?v=EMcjHfceX44)] [CVE-2021-26708] |
| 277 | 297 | ||
| 298 | [2021: "Improving the exploit for CVE-2021-26708 in the Linux kernel to bypass LKRG" by Alexander Popov](https://a13xp0p0v.github.io/2021/08/25/lkrg-bypass.html) [article] [[slides](https://a13xp0p0v.github.io/img/CVE-2021-26708_LKRG_bypass.pdf)] | ||
| 299 | |||
| 300 | [2021: "CVE-2014-3153" by Maher Azzouzi](https://github.com/MaherAzzouzi/LinuxKernelStudy/tree/main/CVE-2014-3153) [article] [CVE-2014-3153] | ||
| 301 | |||
| 278 | [2021: "The curious case of CVE-2020-14381"](https://blog.frizn.fr/linux-kernel/cve-2020-14381) [article] [CVE-2020-14381] | 302 | [2021: "The curious case of CVE-2020-14381"](https://blog.frizn.fr/linux-kernel/cve-2020-14381) [article] [CVE-2020-14381] |
| 279 | 303 | ||
| 280 | [2021: "Galaxy's Meltdown - Exploiting SVE-2020-18610"](https://github.com/vngkv123/articles/blob/main/Galaxy's%20Meltdown%20-%20Exploiting%20SVE-2020-18610.md) [article] [CVE-2020-28343, SVE-2020-18610] | 304 | [2021: "Galaxy's Meltdown - Exploiting SVE-2020-18610"](https://github.com/vngkv123/articles/blob/main/Galaxy's%20Meltdown%20-%20Exploiting%20SVE-2020-18610.md) [article] [CVE-2020-28343, SVE-2020-18610] |
| @@ -560,6 +584,12 @@ Follow [@andreyknvl](https://twitter.com/andreyknvl) on Twitter to be notified o | |||
| 560 | 584 | ||
| 561 | ## Finding Bugs | 585 | ## Finding Bugs |
| 562 | 586 | ||
| 587 | [2021: "Fuzzing Linux with Xen" by Tamas K Lengyel](https://media.defcon.org/DEF%20CON%2029/DEF%20CON%2029%20presentations/Tamas%20K%20Lengyel%20-%20Fuzzing%20Linux%20with%20Xen.pdf) [slides] [[video](https://www.youtube.com/watch?v=_dXC_I2ybr4)] | ||
| 588 | |||
| 589 | [2021: "Variant analysis of the ‘Sequoia’ bug" by Jordy Zomer](https://pwning.systems/posts/sequoia-variant-analysis/) [article] | ||
| 590 | |||
| 591 | [2021: "KMSAN, a look under the hood" by Alexander Potapenko](https://github.com/ramosian-glider/talks-and-presentations/blob/master/2021/KernelMemorySanitizer_a_look_under_the_hood.pdf) [slides] [[video](https://www.youtube.com/watch?v=LNs2U-3m3yg)] | ||
| 592 | |||
| 563 | [2021: "Detecting Kernel Memory Leaks in Specialized Modules with Ownership Reasoning"](https://github.com/QiushiWu/QiushiWu.github.io/blob/main/papers/k-meld.pdf) [paper] | 593 | [2021: "Detecting Kernel Memory Leaks in Specialized Modules with Ownership Reasoning"](https://github.com/QiushiWu/QiushiWu.github.io/blob/main/papers/k-meld.pdf) [paper] |
| 564 | 594 | ||
| 565 | [2021: "Understanding and Detecting Disordered Error Handling with Precise Function Pairing"](https://www.usenix.org/system/files/sec21summer_wu-qiushi.pdf) [paper] | 595 | [2021: "Understanding and Detecting Disordered Error Handling with Precise Function Pairing"](https://www.usenix.org/system/files/sec21summer_wu-qiushi.pdf) [paper] |
| @@ -707,6 +737,8 @@ Follow [@andreyknvl](https://twitter.com/andreyknvl) on Twitter to be notified o | |||
| 707 | 737 | ||
| 708 | ["Linux Kernel Defence Map" by Alexander Popov](https://github.com/a13xp0p0v/linux-kernel-defence-map) | 738 | ["Linux Kernel Defence Map" by Alexander Popov](https://github.com/a13xp0p0v/linux-kernel-defence-map) |
| 709 | 739 | ||
| 740 | [2021: "How AUTOSLAB Changes the Memory Unsafety Game" by Zhenpeng Lin](https://grsecurity.net/how_autoslab_changes_the_memory_unsafety_game) [article] | ||
| 741 | |||
| 710 | [2021: "security things in Linux vX.X" by Kees Cook](https://outflux.net/blog/archives/2021/02/08/security-things-in-linux-v5-8/) [articles] | 742 | [2021: "security things in Linux vX.X" by Kees Cook](https://outflux.net/blog/archives/2021/02/08/security-things-in-linux-v5-8/) [articles] |
| 711 | 743 | ||
| 712 | [2021: "Undo Workarounds for Kernel Bugs"](https://www.usenix.org/system/files/sec21fall-talebi.pdf) [paper] | 744 | [2021: "Undo Workarounds for Kernel Bugs"](https://www.usenix.org/system/files/sec21fall-talebi.pdf) [paper] |
| @@ -980,6 +1012,10 @@ https://github.com/evdenis/cvehound | |||
| 980 | 1012 | ||
| 981 | [github.com/AravGarg/kernel-hacking/ctf-challs](https://github.com/AravGarg/kernel-hacking/tree/master/ctf-challs) | 1013 | [github.com/AravGarg/kernel-hacking/ctf-challs](https://github.com/AravGarg/kernel-hacking/tree/master/ctf-challs) |
| 982 | 1014 | ||
| 1015 | Google CTF 2021 (pwn-fullchain): [source](https://github.com/google/google-ctf/tree/master/2021/quals/pwn-fullchain), [writeup](https://ptr-yudai.hatenablog.com/entry/2021/07/26/225308) | ||
| 1016 | |||
| 1017 | Google CTF 2021 (pwn-ebpf): [source](https://github.com/google/google-ctf/tree/master/2021/quals/pwn-ebpf), [writeup](https://mem2019.github.io/jekyll/update/2021/07/19/GCTF2021-eBPF.html) | ||
| 1018 | |||
| 983 | 3kCTF 2021 (echo): [source and exploit](https://github.com/MaherAzzouzi/3k21-pwn/tree/main/echo) | 1019 | 3kCTF 2021 (echo): [source and exploit](https://github.com/MaherAzzouzi/3k21-pwn/tree/main/echo) |
| 984 | 1020 | ||
| 985 | 3kCTF 2021 (klibrary): [source](https://github.com/MaherAzzouzi/3k21-pwn/tree/main/klibrary), [writeup](https://meowmeowxw.gitlab.io/ctf/3k-2021-klibrary/) | 1021 | 3kCTF 2021 (klibrary): [source](https://github.com/MaherAzzouzi/3k21-pwn/tree/main/klibrary), [writeup](https://meowmeowxw.gitlab.io/ctf/3k-2021-klibrary/) |
| @@ -1096,14 +1132,18 @@ https://github.com/crowell/old_blog/blob/source/source/_posts/2014-11-24-hosting | |||
| 1096 | 1132 | ||
| 1097 | ## Misc | 1133 | ## Misc |
| 1098 | 1134 | ||
| 1099 | https://github.com/bsauce/kernel-security-learning | ||
| 1100 | |||
| 1101 | [2021: "The Complicated History of a Simple Linux Kernel API"](https://www.grsecurity.net/complicated_history_simple_linux_kernel_api) [article] | 1135 | [2021: "The Complicated History of a Simple Linux Kernel API"](https://www.grsecurity.net/complicated_history_simple_linux_kernel_api) [article] |
| 1102 | 1136 | ||
| 1103 | [2021: "On the Feasibility of Stealthily Introducing Vulnerabilities in Open-Source Software via Hypocrite Commit"](https://github.com/QiushiWu/QiushiWu.github.io/blob/main/papers/OpenSourceInsecurity.pdf) [paper] | 1137 | [2021: "On the Feasibility of Stealthily Introducing Vulnerabilities in Open-Source Software via Hypocrite Commit"](https://github.com/QiushiWu/QiushiWu.github.io/blob/main/papers/OpenSourceInsecurity.pdf) [paper] |
| 1104 | 1138 | ||
| 1105 | [2020: "Android / Linux SLUB aliasing for general- and special-purpose caches" by Vitaly Nikolenko](https://www.youtube.com/watch?v=5-eRsA0l8Pg) [video] | 1139 | [2020: "Android / Linux SLUB aliasing for general- and special-purpose caches" by Vitaly Nikolenko](https://www.youtube.com/watch?v=5-eRsA0l8Pg) [video] |
| 1106 | 1140 | ||
| 1141 | [grsecurity CVE-Dataset](https://docs.google.com/spreadsheets/u/0/d/1JO43UfT7Vjun9ytSWNdI17xmnzZMg19Tii-rKw94Rvw/htmlview#gid=0) [spreadsheet] | ||
| 1142 | |||
| 1143 | https://github.com/nccgroup/exploit_mitigations | ||
| 1144 | |||
| 1145 | https://github.com/bsauce/kernel-security-learning | ||
| 1146 | |||
| 1107 | https://github.com/hackedteam | 1147 | https://github.com/hackedteam |
| 1108 | 1148 | ||
| 1109 | https://forums.grsecurity.net/viewforum.php?f=7 | 1149 | https://forums.grsecurity.net/viewforum.php?f=7 |
