Linux Kernel Security – Telegram
Linux Kernel Security
4.02K subscribers
95 photos
318 links
Links related to Linux kernel security and exploitation | Chat @linkersec_chat | @xairy @a13xp0p0v
Download Telegram
Channel created
Channel name was changed to «Linux Kernel Security»
The existing collection of links related to Linux kernel security and exploitation is here:

https://github.com/xairy/linux-kernel-exploitation

New articles, talks, and other updates will be published as new posts on this channel.
Linux Kernel Security pinned «The existing collection of links related to Linux kernel security and exploitation is here: https://github.com/xairy/linux-kernel-exploitation New articles, talks, and other updates will be published as new posts on this channel.»
Fuzzing for eBPF JIT bugs in the Linux kernel

By Simon Scannell.

https://scannell.me/fuzzing-for-ebpf-jit-bugs-in-the-linux-kernel/
The Linux eBPF verifier, the gift that keeps on giving

An LPE exploit for CVE-2020-27194.

https://haxx.in/blasty-vs-ebpf.c
kasan: boot parameters for hardware tag-based mode

Patchset, part of the Memory Tagging in production effort.

https://lkml.org/lkml/2020/11/4/1338
PLATYPUS: Software-based Power Side-Channel Attacks on x86

Side-channel attack via Intel Running Average Power Limit (RAPL). On Linux RAPL counters are available to unprivileged users, and the attack allows leaking encryption keys from kernel modules and bypassing KASLR.

Info: https://platypusattack.com/
Paper: https://platypusattack.com/platypus.pdf
Fix: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=949dd0104c496fa7c14991a23c03c62e44637e71
We now have a chat for comments and discussions: @linkersec_chat
Debugging the Kernel with QEMU by Keith Makan

The first post of a potential upcoming Linux kernel exploitation series. Building and running Linux kernel in QEMU. Debugging a kernel module with GDB.

https://blog.k3170makan.com/2020/11/linux-kernel-exploitation-0x0-debugging.html
Finding and exploiting a bug in an old Android phone

Finding and exploiting a Linux kernel bug in an old Motorola phone. A stream, live right now! By Brandon Falk.

Live: https://www.twitch.tv/gamozo
Part 1: https://www.youtube.com/watch?v=g62FXds2pt8
Part 2: https://www.youtube.com/watch?v=qnyFk-f3Koo
Samsung NPU (Neural Processing Unit) memory corruption in shared memory parsing

P0 researchers Ben Hawkes and Brandon Azad found a few kernel bugs affecting Galaxy S10 and Galaxy S20. The report includes a proof-of-concept exploit that obtains kernel read/write/execute primitive.

Info: https://bugs.chromium.org/p/project-zero/issues/detail?id=2073
Exploit: https://bugs.chromium.org/p/project-zero/issues/detail?id=2073#c1
Explaining the exploit and rants by Brandon Falk

Brandon Falk summarizes the work done on a bug in an old Motorola phone he found and exploited on stream a couple of days ago.

https://www.youtube.com/watch?v=t-t7D0vQNmo
grsecurity is nominated for a PWNIE Award 2020 as the Lamest Vendor Response

Nomination
https://pwnies.com/nominations/active/lamest-vendor-response/open-source-security-inc-grsecurity-pax

Report
Control-Flow Integrity for the Linux kernel: A Security Evaluation (by Federico Bento): https://repositorio-aberto.up.pt/bitstream/10216/125357/2/374717.pdf