diff options
| author | Andrey Konovalov | 2024-05-16 16:37:10 +0200 |
|---|---|---|
| committer | Andrey Konovalov | 2024-05-16 16:37:10 +0200 |
| commit | 937cd07224f93d386fcee24d461f0e9787d7737c (patch) | |
| tree | 3beca56587adcb29adf009a3aa600c64be14f8b0 /README.md | |
| parent | f3a3b36bbd2973b4795236b6b28c2324c1c4670c (diff) | |
March/April updates
Diffstat (limited to 'README.md')
| -rw-r--r-- | README.md | 68 |
1 files changed, 62 insertions, 6 deletions
| @@ -52,6 +52,8 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). | |||
| 52 | 52 | ||
| 53 | ### Exploitation | 53 | ### Exploitation |
| 54 | 54 | ||
| 55 | [2024: "GhostRace: Exploiting and Mitigating Speculative Race Conditions"](https://www.vusec.net/projects/ghostrace/) [paper] | ||
| 56 | |||
| 55 | [2024: "K-LEAK: Towards Automating the Generation of Multi-Step Infoleak Exploits against the Linux Kernel"](https://www.ndss-symposium.org/wp-content/uploads/2024-935-paper.pdf) [paper] | 57 | [2024: "K-LEAK: Towards Automating the Generation of Multi-Step Infoleak Exploits against the Linux Kernel"](https://www.ndss-symposium.org/wp-content/uploads/2024-935-paper.pdf) [paper] |
| 56 | 58 | ||
| 57 | [2024: "Beyond Control: Exploring Novel File System Objects for Data-Only Attacks on Linux Systems"](https://arxiv.org/pdf/2401.17618.pdf) [paper] | 59 | [2024: "Beyond Control: Exploring Novel File System Objects for Data-Only Attacks on Linux Systems"](https://arxiv.org/pdf/2401.17618.pdf) [paper] |
| @@ -70,7 +72,7 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). | |||
| 70 | 72 | ||
| 71 | [2023: "Breaking Hardware-Assisted Kernel Control-Flow Integrity with Page-Oriented Programming" by Seunghun Han](https://i.blackhat.com/BH-US-23/Presentations/US-23-Han-Lost-Control-Breaking-Hardware-Assisted-Kernel.pdf) [slides] | 73 | [2023: "Breaking Hardware-Assisted Kernel Control-Flow Integrity with Page-Oriented Programming" by Seunghun Han](https://i.blackhat.com/BH-US-23/Presentations/US-23-Han-Lost-Control-Breaking-Hardware-Assisted-Kernel.pdf) [slides] |
| 72 | 74 | ||
| 73 | [2023: "Make KSMA Great Again: The Art of Rooting Android devices by GPU MMU features" by Yong Wang](https://i.blackhat.com/BH-US-23/Presentations/US-23-WANG-The-Art-of-Rooting-Android-devices-by-GPU-MMU-features.pdf) [slides] | 75 | [2023: "Make KSMA Great Again: The Art of Rooting Android devices by GPU MMU features" by Yong Wang](https://i.blackhat.com/BH-US-23/Presentations/US-23-WANG-The-Art-of-Rooting-Android-devices-by-GPU-MMU-features.pdf) [[video](https://www.youtube.com/watch?v=2qkwSPnQqrU)] [slides] |
| 74 | 76 | ||
| 75 | [2023: "A new method for container escape using file-based DirtyCred" by Choo Yi Kai](https://starlabs.sg/blog/2023/07-a-new-method-for-container-escape-using-file-based-dirtycred/) [article] | 77 | [2023: "A new method for container escape using file-based DirtyCred" by Choo Yi Kai](https://starlabs.sg/blog/2023/07-a-new-method-for-container-escape-using-file-based-dirtycred/) [article] |
| 76 | 78 | ||
| @@ -345,6 +347,8 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). | |||
| 345 | 347 | ||
| 346 | ### Info-leaks | 348 | ### Info-leaks |
| 347 | 349 | ||
| 350 | [2024: "Out of the kernel, into the tokens" by Max Ammann and Emilio Lopez](https://blog.trailofbits.com/2024/03/08/out-of-the-kernel-into-the-tokens/) [article] | ||
| 351 | |||
| 348 | [2023: "The code that wasn’t there: Reading memory on an Android device by accident" by Man Yue Mo](https://github.blog/2023-02-23-the-code-that-wasnt-there-reading-memory-on-an-android-device-by-accident/) [article] [CVE-2022-25664] | 352 | [2023: "The code that wasn’t there: Reading memory on an Android device by accident" by Man Yue Mo](https://github.blog/2023-02-23-the-code-that-wasnt-there-reading-memory-on-an-android-device-by-accident/) [article] [CVE-2022-25664] |
| 349 | 353 | ||
| 350 | [2023: "EntryBleed: A Universal KASLR Bypass against KPTI on Linux"](https://dl.acm.org/doi/pdf/10.1145/3623652.3623669) [paper] [CVE-2022-4543] | 354 | [2023: "EntryBleed: A Universal KASLR Bypass against KPTI on Linux"](https://dl.acm.org/doi/pdf/10.1145/3623652.3623669) [paper] [CVE-2022-4543] |
| @@ -392,6 +396,22 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). | |||
| 392 | 396 | ||
| 393 | ### LPE | 397 | ### LPE |
| 394 | 398 | ||
| 399 | [2024: "Flipping Pages: An analysis of a new Linux vulnerability in nf_tables and hardened exploitation techniques" by notselwyn](https://pwning.tech/nftables/) [article] [[exploit](https://github.com/Notselwyn/CVE-2024-1086)] [CVE-2024-1086] | ||
| 400 | |||
| 401 | [2024: "64 bytes and a ROP chain – A journey through nftables" by Davide Ornaghi](https://betrusted.it/blog/64-bytes-and-a-rop-chain-part-1/) [article] [[part 2](https://betrusted.it/blog/64-bytes-and-a-rop-chain-part-2/)] [[exploit](https://github.com/TurtleARM/CVE-2023-0179-PoC)] [CVE-2023-0179] | ||
| 402 | |||
| 403 | [2024: "Mind the Patch Gap: Exploiting an io_uring Vulnerability in Ubuntu" by Oriol Castejon](https://blog.exodusintel.com/2024/03/27/mind-the-patch-gap-exploiting-an-io_uring-vulnerability-in-ubuntu/) [CVE-2024-0582] | ||
| 404 | |||
| 405 | [2024: "CVE-2022-2586 Writeup"](https://jmpeax.dev/CVE-2022-2586-writeup.html) [article] [CVE-2022-2586] | ||
| 406 | |||
| 407 | [2024: "n_gsm_exploit"](https://github.com/fff-vr/n_gsm_exploit) [article] | ||
| 408 | |||
| 409 | [2024: "The tale of a GSM Kernel LPE"](https://jmpeax.dev/The-tale-of-a-GSM-Kernel-LPE.html) [article] [[exploit](https://github.com/jmpe4x/GSM_Linux_Kernel_LPE_Nday_Exploit)] [[notes](https://mastodon.social/@gabe_k/112251322421680553)] [[discussion](https://www.openwall.com/lists/oss-security/2024/04/10/18)] | ||
| 410 | |||
| 411 | [2024: "Gaining kernel code execution on an MTE-enabled Pixel 8" by Man Yue Mo](https://github.blog/2024-03-18-gaining-kernel-code-execution-on-an-mte-enabled-pixel-8/) [article] [[exploit](https://github.com/github/securitylab/tree/main/SecurityExploits/Android/Mali/CVE_2023_6241)] [CVE-2023-6241] | ||
| 412 | |||
| 413 | [2024: "Mali GPU Kernel LPE: Android 14 kernel exploit for Pixel7/8 Pro" by Mohamed Ghannam](https://github.com/0x36/Pixel_GPU_Exploit) [article] [CVE-2023-26083] | ||
| 414 | |||
| 395 | [2023: "Linux Kernel GSM Multiplexing Race Condition Local Privilege Escalation Vulnerability (CVE-2023-6546)" by Nassim Asrir](https://github.com/Nassim-Asrir/ZDI-24-020/) [CVE-2023-6546] | 415 | [2023: "Linux Kernel GSM Multiplexing Race Condition Local Privilege Escalation Vulnerability (CVE-2023-6546)" by Nassim Asrir](https://github.com/Nassim-Asrir/ZDI-24-020/) [CVE-2023-6546] |
| 396 | 416 | ||
| 397 | [2023: "Conquering the memory through io_uring - Analysis of CVE-2023-2598"](https://anatomic.rip/cve-2023-2598/) [article] [[exploit](https://github.com/ysanatomic/io_uring_LPE-CVE-2023-2598)] [CVE-2023-2598] | 417 | [2023: "Conquering the memory through io_uring - Analysis of CVE-2023-2598"](https://anatomic.rip/cve-2023-2598/) [article] [[exploit](https://github.com/ysanatomic/io_uring_LPE-CVE-2023-2598)] [CVE-2023-2598] |
| @@ -414,7 +434,7 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). | |||
| 414 | 434 | ||
| 415 | [2023: "Linux Kernel Exploit (CVE-2022–32250) with mqueue"](https://blog.theori.io/linux-kernel-exploit-cve-2022-32250-with-mqueue-a8468f32aab5) [article] [CVE-2022–32250] | 435 | [2023: "Linux Kernel Exploit (CVE-2022–32250) with mqueue"](https://blog.theori.io/linux-kernel-exploit-cve-2022-32250-with-mqueue-a8468f32aab5) [article] [CVE-2022–32250] |
| 416 | 436 | ||
| 417 | [2023: "Bad io_uring: A New Era of Rooting for Android" by Zhenpeng Lin](https://i.blackhat.com/BH-US-23/Presentations/US-23-Lin-bad_io_uring.pdf) [slides] [CVE-2022-20409] | 437 | [2023: "Bad io_uring: A New Era of Rooting for Android" by Zhenpeng Lin](https://i.blackhat.com/BH-US-23/Presentations/US-23-Lin-bad_io_uring.pdf) [slides] [[video](https://www.youtube.com/watch?v=fhx3W1z7YD0)] [CVE-2022-20409] |
| 418 | 438 | ||
| 419 | [2023: "CVE-2023-3389 - LinkedPoll" by Querijn Voet](https://qyn.app/posts/CVE-2023-3389/) [article] [CVE-2023-3389] | 439 | [2023: "CVE-2023-3389 - LinkedPoll" by Querijn Voet](https://qyn.app/posts/CVE-2023-3389/) [article] [CVE-2023-3389] |
| 420 | 440 | ||
| @@ -856,6 +876,8 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). | |||
| 856 | 876 | ||
| 857 | ### Other | 877 | ### Other |
| 858 | 878 | ||
| 879 | [2024: "Notes about ZDI-24-195 in ksmbd"](https://twitter.com/Shiftreduce/status/1773385937893896206) [thread] [ZDI-24-195] | ||
| 880 | |||
| 859 | [2024: "PowerVR GPU - GPU Firmware may overwrite arbitrary kernel pages by RGXCreateFreeList"](https://bugs.chromium.org/p/apvi/issues/detail?id=140) [report] | 881 | [2024: "PowerVR GPU - GPU Firmware may overwrite arbitrary kernel pages by RGXCreateFreeList"](https://bugs.chromium.org/p/apvi/issues/detail?id=140) [report] |
| 860 | 882 | ||
| 861 | [2024: "PowerVR GPU - UAF race conditon by DevmemIntPFNotify and DevmemIntCtxRelease"](https://bugs.chromium.org/p/apvi/issues/detail?id=141) [report] | 883 | [2024: "PowerVR GPU - UAF race conditon by DevmemIntPFNotify and DevmemIntCtxRelease"](https://bugs.chromium.org/p/apvi/issues/detail?id=141) [report] |
| @@ -933,6 +955,14 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). | |||
| 933 | 955 | ||
| 934 | ## Finding Bugs | 956 | ## Finding Bugs |
| 935 | 957 | ||
| 958 | [2024: "Your NVMe Had Been Syz’ed: Fuzzing NVMe-oF/TCP Driver for Linux with Syzkaller" by Alon Zavahi](https://www.cyberark.com/resources/threat-research-blog/your-nvme-had-been-syzed-fuzzing-nvme-of-tcp-driver-for-linux-with-syzkaller) [article] [[slides](https://download.scrt.ch/insomnihack/ins24-slides/Syzkaller%20NVMe-oF.pdf)] [[video](https://www.youtube.com/watch?v=Jc25CM1Ppgo)] | ||
| 959 | |||
| 960 | [2024: "Structure-Aware linux kernel Fuzzing with libFuzzer"](https://r00tkitsmm.github.io/fuzzing/2024/03/27/libffuzzerkernel.html) [article] | ||
| 961 | |||
| 962 | [2024: "Enhancing Kernel Bug Discovery with Large Language Models" by Zahra Tarkhani](https://static.sched.com/hosted_files/lssna24/ed/LSSNA-Enhancing%20Kernel%20Bug%20Discovery%20with%20Large%20Language%20Models%20%E2%80%8B.pdf) [slides] [[video](https://www.youtube.com/watch?v=ewv3kX-p7-o)] | ||
| 963 | |||
| 964 | [2024: "SyzRisk: A Change-Pattern-Based Continuous Kernel Regression Fuzzer"](https://nebelwelt.net/files/24AsiaCCS.pdf) [paper] | ||
| 965 | |||
| 936 | [2024: "SyzBridge: Bridging the Gap in Exploitability Assessment of Linux Kernel Bugs in the Linux Ecosystem"](https://zhyfeng.github.io/files/2024-NDSS-SyzBridge.pdf) [paper] | 966 | [2024: "SyzBridge: Bridging the Gap in Exploitability Assessment of Linux Kernel Bugs in the Linux Ecosystem"](https://zhyfeng.github.io/files/2024-NDSS-SyzBridge.pdf) [paper] |
| 937 | 967 | ||
| 938 | [2024: "SyzRetrospector: A Large-Scale Retrospective Study of Syzbot"](https://arxiv.org/pdf/2401.11642.pdf) [paper] | 968 | [2024: "SyzRetrospector: A Large-Scale Retrospective Study of Syzbot"](https://arxiv.org/pdf/2401.11642.pdf) [paper] |
| @@ -1196,6 +1226,16 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). | |||
| 1196 | 1226 | ||
| 1197 | ["Linux Kernel Defence Map" by Alexander Popov](https://github.com/a13xp0p0v/linux-kernel-defence-map) | 1227 | ["Linux Kernel Defence Map" by Alexander Popov](https://github.com/a13xp0p0v/linux-kernel-defence-map) |
| 1198 | 1228 | ||
| 1229 | [2024: "Mitigating Integer Overflow in C" by Kees Cook](https://outflux.net/slides/2024/lss-na/) [slides] [[video](https://www.youtube.com/watch?v=PLcZkgHCk90)] | ||
| 1230 | |||
| 1231 | [2024: "Gaining bounds-checking on trailing arrays in the Upstream Linux Kernel" by Gustavo A. R. Silva](https://embeddedor.com/slides/2024/eo/eo2024.pdf) [slides] | ||
| 1232 | |||
| 1233 | [2024: "A Hybrid Alias Analysis Framework and Its Application to Protecting the Linux Kernel" by Guoren Li](https://www.youtube.com/watch?v=F4L2mBqnh30) [video] | ||
| 1234 | |||
| 1235 | [2024: "Hardening the kernel against heap-spraying attacks" by Jonathan Corbet](https://lwn.net/Articles/965837/) [article] | ||
| 1236 | |||
| 1237 | [2024: "Notes on the 'slab: Introduce dedicated bucket allocator' series" by Julien Voisin](https://dustri.org/b/notes-on-the-slab-introduce-dedicated-bucket-allocator-series.html) [article] | ||
| 1238 | |||
| 1199 | [2023: "Exploring Linux's New Random Kmalloc Caches" by sam4k](https://sam4k.com/exploring-linux-random-kmalloc-caches/) [article] | 1239 | [2023: "Exploring Linux's New Random Kmalloc Caches" by sam4k](https://sam4k.com/exploring-linux-random-kmalloc-caches/) [article] |
| 1200 | 1240 | ||
| 1201 | [2023: "Toolchain security features status update"](https://outflux.net/slides/2023/lpc/features.pdf) [slides] [[video](https://www.youtube.com/watch?v=OEFFqhP5sts)] | 1241 | [2023: "Toolchain security features status update"](https://outflux.net/slides/2023/lpc/features.pdf) [slides] [[video](https://www.youtube.com/watch?v=OEFFqhP5sts)] |
| @@ -1479,14 +1519,16 @@ https://www.openwall.com/lists/oss-security/2023/05/15/5 [CVE-2023-32233] | |||
| 1479 | 1519 | ||
| 1480 | https://github.com/Liuk3r/CVE-2023-32233 | 1520 | https://github.com/Liuk3r/CVE-2023-32233 |
| 1481 | 1521 | ||
| 1482 | https://github.com/TurtleARM/CVE-2023-0179-PoC | ||
| 1483 | |||
| 1484 | https://github.com/lanleft/CVE2023-1829 | 1522 | https://github.com/lanleft/CVE2023-1829 |
| 1485 | 1523 | ||
| 1486 | https://github.com/TurtleARM/CVE-2023-3338-DECPwn | 1524 | https://github.com/TurtleARM/CVE-2023-3338-DECPwn |
| 1487 | 1525 | ||
| 1488 | https://github.com/kungfulon/nf-tables-lpe | 1526 | https://github.com/kungfulon/nf-tables-lpe |
| 1489 | 1527 | ||
| 1528 | https://github.com/ysanatomic/io_uring_LPE-CVE-2024-0582 | ||
| 1529 | |||
| 1530 | https://github.com/YuriiCrimson/ExploitGSM/ [[notes](https://mastodon.social/@gabe_k/112251322421680553)] [[discussion](https://www.openwall.com/lists/oss-security/2024/04/10/18)] | ||
| 1531 | |||
| 1490 | 1532 | ||
| 1491 | ## Tools | 1533 | ## Tools |
| 1492 | 1534 | ||
| @@ -1585,14 +1627,20 @@ https://github.com/nccgroup/libslub | |||
| 1585 | 1627 | ||
| 1586 | https://github.com/a13xp0p0v/kernel-hardening-checker | 1628 | https://github.com/a13xp0p0v/kernel-hardening-checker |
| 1587 | 1629 | ||
| 1588 | https://github.com/marin-m/vmlinux-to-elf | ||
| 1589 | |||
| 1590 | https://github.com/heki-linux | 1630 | https://github.com/heki-linux |
| 1591 | 1631 | ||
| 1592 | https://github.com/oswalpalash/linux-kernel-regression-tests | 1632 | https://github.com/oswalpalash/linux-kernel-regression-tests |
| 1593 | 1633 | ||
| 1594 | https://github.com/google/security-research/blob/master/analysis/kernel/heap-exploitation/README.md [CodeQL] [[dashboard](https://lookerstudio.google.com/reporting/68b02863-4f5c-4d85-b3c1-992af89c855c/page/n92nD)] | 1634 | https://github.com/google/security-research/blob/master/analysis/kernel/heap-exploitation/README.md [CodeQL] [[dashboard](https://lookerstudio.google.com/reporting/68b02863-4f5c-4d85-b3c1-992af89c855c/page/n92nD)] |
| 1595 | 1635 | ||
| 1636 | https://github.com/milabs/kiddy | ||
| 1637 | |||
| 1638 | https://github.com/androidoffsec/art-kernel-toolkit | ||
| 1639 | |||
| 1640 | https://github.com/notselwyn/get-sig | ||
| 1641 | |||
| 1642 | https://github.com/gsingh93/linux-exploit-dev-env | ||
| 1643 | |||
| 1596 | 1644 | ||
| 1597 | ## Practice | 1645 | ## Practice |
| 1598 | 1646 | ||
| @@ -1623,6 +1671,8 @@ corCTF 2023 (sysruption): [writeup](https://www.willsroot.io/2023/08/sysruption. | |||
| 1623 | 1671 | ||
| 1624 | corCTF 2023 (zeroday, kcipher): [writeup](https://blog.libh0ps.so/2023/08/02/corCTF2023.html) | 1672 | corCTF 2023 (zeroday, kcipher): [writeup](https://blog.libh0ps.so/2023/08/02/corCTF2023.html) |
| 1625 | 1673 | ||
| 1674 | hxp CTF 2022 (one_byte): [writeup](https://hxp.io/blog/99/hxp-CTF-2022-one_byte-writeup/) | ||
| 1675 | |||
| 1626 | BFS Ekoparty 2022 (blunder): [writeup](https://klecko.github.io/posts/bfs-ekoparty-2022/) | 1676 | BFS Ekoparty 2022 (blunder): [writeup](https://klecko.github.io/posts/bfs-ekoparty-2022/) |
| 1627 | 1677 | ||
| 1628 | D^3CTF 2022 (d3bpf): [writeup](https://stdnoerr.github.io/writeup/2022/08/21/eBPF-exploitation-(ft.-D-3CTF-d3bpf).html), [writeup 2](https://github.com/chujDK/d3ctf2022-pwn-d3bpf-and-v2) | 1678 | D^3CTF 2022 (d3bpf): [writeup](https://stdnoerr.github.io/writeup/2022/08/21/eBPF-exploitation-(ft.-D-3CTF-d3bpf).html), [writeup 2](https://github.com/chujDK/d3ctf2022-pwn-d3bpf-and-v2) |
| @@ -1796,6 +1846,10 @@ https://github.com/0xor0ne/awesome-list/ | |||
| 1796 | 1846 | ||
| 1797 | ## Misc | 1847 | ## Misc |
| 1798 | 1848 | ||
| 1849 | [2024: "Make your own backdoor: CFLAGS code injection, Makefile injection, pkg-config" by Vegard Nossum](https://www.openwall.com/lists/oss-security/2024/04/17/3) [article] | ||
| 1850 | |||
| 1851 | [2024: "Demo showing Claude Opus does not find CVE-2023-0266" by Sean Heelan](https://github.com/SeanHeelan/claude_opus_cve_2023_0266) [article] | ||
| 1852 | |||
| 1799 | [2024: "Linux is a CNA" by Greg Kroah-Hartman](http://www.kroah.com/log/blog/2024/02/13/linux-is-a-cna/) [article] | 1853 | [2024: "Linux is a CNA" by Greg Kroah-Hartman](http://www.kroah.com/log/blog/2024/02/13/linux-is-a-cna/) [article] |
| 1800 | 1854 | ||
| 1801 | [2024: "An Investigation of Patch Porting Practices of the Linux Kernel Ecosystem"](https://arxiv.org/pdf/2402.05212.pdf) [paper] | 1855 | [2024: "An Investigation of Patch Porting Practices of the Linux Kernel Ecosystem"](https://arxiv.org/pdf/2402.05212.pdf) [paper] |
| @@ -1838,6 +1892,8 @@ https://github.com/0xor0ne/awesome-list/ | |||
| 1838 | 1892 | ||
| 1839 | [Syzkaller Coverage Dashboard](https://lookerstudio.google.com/reporting/41ae4a20-9826-4f7f-be14-a934a04686fe/page/4EOpD) | 1893 | [Syzkaller Coverage Dashboard](https://lookerstudio.google.com/reporting/41ae4a20-9826-4f7f-be14-a934a04686fe/page/4EOpD) |
| 1840 | 1894 | ||
| 1895 | [kernel vulns missing stable backports](https://docs.google.com/spreadsheets/d/1JzRy4amgEn98KvyNs1yB4H_R08TovFZH0nutWx2tvZg/view#gid=0) [[source](https://twitter.com/sirdarckcat/status/1779894891608220052)] | ||
| 1896 | |||
| 1841 | https://github.com/nccgroup/exploit_mitigations | 1897 | https://github.com/nccgroup/exploit_mitigations |
| 1842 | 1898 | ||
| 1843 | https://github.com/bsauce/kernel-security-learning | 1899 | https://github.com/bsauce/kernel-security-learning |
