Exploiting Dirty Pipe on Android
Two publications about exploiting Dirty Pipe on Android. Both use similar techniques without additional vulnerabilities.
1. Notes and an exploit by polygraphene.
2. Slides by Giovanni Rocca.
Two publications about exploiting Dirty Pipe on Android. Both use similar techniques without additional vulnerabilities.
1. Notes and an exploit by polygraphene.
2. Slides by Giovanni Rocca.
GitHub
DirtyPipe-Android/TECHNICAL-DETAILS.md at master · polygraphene/DirtyPipe-Android
Dirty Pipe root exploit for Android (Pixel 6). Contribute to polygraphene/DirtyPipe-Android development by creating an account on GitHub.
👍5😱3👎2
Tetragone: A Lesson in Security Fundamentals
An article by Pawel Wieczorkiewicz and Brad Spengler about bypassing post-exploitation detection provided by Tetragon.
The article also expands on the impossibility of preventing malicious post-exploitation activity if the prevention component works at the same privilege level as the attacked code.
Similar concerns affect LKRG. Check out the LKRG bypass article by Alexander Popov for the details.
An article by Pawel Wieczorkiewicz and Brad Spengler about bypassing post-exploitation detection provided by Tetragon.
The article also expands on the impossibility of preventing malicious post-exploitation activity if the prevention component works at the same privilege level as the attacked code.
Similar concerns affect LKRG. Check out the LKRG bypass article by Alexander Popov for the details.
grsecurity.net
grsecurity - Tetragone: A Lesson in Security Fundamentals
In this blog post, we take the reader on a journey through a bypass of a new eBPF-based observability and mitigation tool named Tetragon, developed in the two hours after the tool was first set up, as a hopefully instructive lesson on the importance of security…
👍5
A Kernel Hacker Meets Fuchsia OS
Alexander Popov (me) published an article about hacking the Zircon microkernel of Fuchsia OS.
Experience in Linux kernel security helped to assess Fuchsia OS from the attacker's point of view.
Summary:
🟪 Fuchsia security architecture
🟪 Exploit development experiments for the Zircon microkernel
🟪 PoC attack planting a rootkit into the microkernel
Alexander Popov (me) published an article about hacking the Zircon microkernel of Fuchsia OS.
Experience in Linux kernel security helped to assess Fuchsia OS from the attacker's point of view.
Summary:
🟪 Fuchsia security architecture
🟪 Exploit development experiments for the Zircon microkernel
🟪 PoC attack planting a rootkit into the microkernel
Alexander Popov
A Kernel Hacker Meets Fuchsia OS
Fuchsia is a general-purpose open-source operating system created by Google. It is based on the Zircon microkernel written in C++ and is currently under active development. The developers say that Fuchsia is designed with a focus on security, updatability…
🔥16👍4
kconfig-hardened-check: new feature
kconfig-hardened-check is a tool for checking the security hardening options of the Linux kernel.
Initially, it supported checking compile-time Kconfig options that are relevant for security.
And now this tool can also check the kernel cmdline options, aka boot parameters.
kconfig-hardened-check is a tool for checking the security hardening options of the Linux kernel.
Initially, it supported checking compile-time Kconfig options that are relevant for security.
And now this tool can also check the kernel cmdline options, aka boot parameters.
GitHub
GitHub - a13xp0p0v/kernel-hardening-checker: A tool for checking the security hardening options of the Linux kernel
A tool for checking the security hardening options of the Linux kernel - a13xp0p0v/kernel-hardening-checker
👍9🤔2
Fuzzing USB with Raw Gadget
Slides and video from a talk by Andrey Konovalov on fuzzing USB drivers.
The talk covers:
🤖 Raw Gadget — a new interface for emulating USB devices
🪶 Fuzzing in a VM via virtual USB controllers
🔌 Reproducing found bugs via Raspberry Pi Zero
Slides and video from a talk by Andrey Konovalov on fuzzing USB drivers.
The talk covers:
🤖 Raw Gadget — a new interface for emulating USB devices
🪶 Fuzzing in a VM via virtual USB controllers
🔌 Reproducing found bugs via Raspberry Pi Zero
Google Docs
2022, BSides Munich: Fuzzing USB with Raw Gadget
Fuzzing USB with Raw Gadget Andrey Konovalov, xairy.io BSides Munich May 16th 2022
👍10🔥8
Linux kernel heap feng shui in 2022
An article by Michael S and Vitaly Nikolenko describing the kernel changes that affected exploitation techniques for slab-related vulnerabilities over the last few years.
An article by Michael S and Vitaly Nikolenko describing the kernel changes that affected exploitation techniques for slab-related vulnerabilities over the last few years.
Duasynt
Linux kernel heap feng shui in 2022 - Michael S, Vitaly Nikolenko
👍8🔥2🤔1
Two eBPF exploits
Exploits for two bugs in the eBPF code, CVE-2021-4204 and CVE-2022-23222, by tr3e with brief write-ups in Chinese.
Exploits for two bugs in the eBPF code, CVE-2021-4204 and CVE-2022-23222, by tr3e with brief write-ups in Chinese.
GitHub
GitHub - tr3ee/CVE-2021-4204: CVE-2021-4204: Linux Kernel eBPF Local Privilege Escalation
CVE-2021-4204: Linux Kernel eBPF Local Privilege Escalation - tr3ee/CVE-2021-4204
🔥2👍1
Exploration of the Dirty Pipe Vulnerability (CVE-2022-0847)
An article by Valentin Obst and Martin Claus covering the Dirty Pipe vulnerability. The article also suggests a few approaches to investigating Linux kernel bugs.
An article by Valentin Obst and Martin Claus covering the Dirty Pipe vulnerability. The article also suggests a few approaches to investigating Linux kernel bugs.
lolcads tech blog
Exploration of the Dirty Pipe Vulnerability (CVE-2022-0847)
Intro This blog post reflects our exploration of the Dirty Pipe Vulnerability in the Linux kernel. The bug was discovered by Max Kellermann and described here . If you haven’t read the original publication yet, we’d suggest that you read it first (maybe also…
👍5
Yet another bug into Netfilter
An article by Arthur Mongodin about exploiting an out-of-bounds access in the netfilter subsystem to achieve an info-leak. The article also suggests a potential approach to gain privilege escalation.
An article by Arthur Mongodin about exploiting an out-of-bounds access in the netfilter subsystem to achieve an info-leak. The article also suggests a potential approach to gain privilege escalation.
👍9
io_uring - new code, new bugs, and a new exploit technique
Lam Jun Rong published an article that covers analyzing and exploiting CVE-2021-41073, an invalid-free vulnerability in the io_uring subsystem.
This vulnerability has previously been exploited by Valentina Palmiotti, but that exploit relied on eBPF. The new exploit targets Ubuntu 21.10, where eBPF is not available to unprivileged users.
Lam Jun Rong published an article that covers analyzing and exploiting CVE-2021-41073, an invalid-free vulnerability in the io_uring subsystem.
This vulnerability has previously been exploited by Valentina Palmiotti, but that exploit relied on eBPF. The new exploit targets Ubuntu 21.10, where eBPF is not available to unprivileged users.
👍3
The Android kernel mitigations obstacle race
A great article by Man Yue Mo about exploiting a race condition that leads to a use-after-free vulnerability in the Qualcomm GPU driver for Samsung Galaxy Z Flip3.
The researcher widened the race window to hit the bug reliably, and then bypassed kCFI, automatic variable initialization, and Samsung RKP in the exploit.
A great article by Man Yue Mo about exploiting a race condition that leads to a use-after-free vulnerability in the Qualcomm GPU driver for Samsung Galaxy Z Flip3.
The researcher widened the race window to hit the bug reliably, and then bypassed kCFI, automatic variable initialization, and Samsung RKP in the exploit.
The GitHub Blog
The Android kernel mitigations obstacle race
In this post I’ll exploit CVE-2022-22057, a use-after-free in the Qualcomm gpu kernel driver, to gain root and disable SELinux from the untrusted app sandbox on a Samsung Z flip 3. I’ll look at various mitigations that are implemented on modern Android devices…
👏7🔥1
TripleCross
A Linux eBPF rootkit providing a backdoor with command and control (C2) capabilities, library injection, execution hijacking, persistence, and hiding.
A Linux eBPF rootkit providing a backdoor with command and control (C2) capabilities, library injection, execution hijacking, persistence, and hiding.
🔥6👍3🤔1
[CVE-2022-34918] A crack in the Linux firewall
An article by Arthur Mongodin about exploiting a slab-buffer-overflow in the netfilter subsystem.
The exploit uses the unlinking technique from Lam Jun Rong's io_uring exploit.
An article by Arthur Mongodin about exploiting a slab-buffer-overflow in the netfilter subsystem.
The exploit uses the unlinking technique from Lam Jun Rong's io_uring exploit.
👍4
Corrupting memory without memory corruption
An article by Man Yue Mo about exploiting CVE-2022-20186, an integer overflow in the Arm Mali GPU driver.
The bug allows mapping arbitrary physical pages to the GPU memory with both read and write access. The exploit gets arbitrary kernel code execution on Pixel 6, disables SELinux, and gains root.
An article by Man Yue Mo about exploiting CVE-2022-20186, an integer overflow in the Arm Mali GPU driver.
The bug allows mapping arbitrary physical pages to the GPU memory with both read and write access. The exploit gets arbitrary kernel code execution on Pixel 6, disables SELinux, and gains root.
The GitHub Blog
Corrupting memory without memory corruption
In this post I’ll exploit CVE-2022-20186, a vulnerability in the Arm Mali GPU kernel driver and use it to gain arbitrary kernel memory access from an untrusted app on a Pixel 6. This then allows me to gain root and disable SELinux. This vulnerability highlights…
👍9
PAWNYABLE: Linux Kernel Exploitation
A series of articles in Japanese by ptr-yudai covering various Linux kernel exploitation techniques.
A series of articles in Japanese by ptr-yudai covering various Linux kernel exploitation techniques.
PAWNYABLE!
Linux Kernel Exploitation - PAWNYABLE!
もふもふpwnワールド
🔥5👍1🤯1
The quantum state of Linux kernel garbage collection CVE-2021-0920 (Part I)
Xingyu Jin published an article describing the root cause of a race condition in the garbage collection for SCM_RIGHTS.
This bug is used for Android exploitation in the wild.
Xingyu Jin published an article describing the root cause of a race condition in the garbage collection for SCM_RIGHTS.
This bug is used for Android exploitation in the wild.
👍3
CVE-2022-29582, an io_uring vulnerability
A detailed and well-written article by Awarau and David Bouman about exploiting a slab use-after-free vulnerability in the io_uring subsystem.
The exploit leverages a cross-cache attack and msg_msg spraying to overwrite a tls_context object and execute a ROP chain to gain root.
A detailed and well-written article by Awarau and David Bouman about exploiting a slab use-after-free vulnerability in the io_uring subsystem.
The exploit leverages a cross-cache attack and msg_msg spraying to overwrite a tls_context object and execute a ROP chain to gain root.
Computer security and related topics
CVE-2022-29582
This post covers an interesting vulnerability we (Jayden and David) found in the io_uring subsystem of the Linux kernel.
👍4🔥3🤯2
Reviving Exploits Against Cred Structs - Six Byte Cross Cache Overflow to Leakless Data-Oriented Kernel Pwnage
FizzBuzz101 published an article describing a solution of their corCTF challenge Cache of Castaways.
The PoC exploit implemented a cross cache overflow attack against cred structs in isolated slabs.
FizzBuzz101 published an article describing a solution of their corCTF challenge Cache of Castaways.
The PoC exploit implemented a cross cache overflow attack against cred structs in isolated slabs.
www.willsroot.io
Reviving Exploits Against Cred Structs - Six Byte Cross Cache Overflow to Leakless Data-Oriented Kernel Pwnage
Vulnerability Research on Low-Level Systems
👍4
CoRJail: From Null Byte Overflow To Docker Escape Exploiting poll_list Objects In The Linux Kernel
D3v17 published an article describing the solution of their corCTF challenge CoRJail.
The PoC exploit used a single null-byte out-of-bounds write to corrupt a poll_list object in the kmalloc-4k slab cache and obtain an arbitrary free primitive.
It allowed the researcher to corrupt a user_key_payload structure and get out-of-bounds read.
Finally the researcher used the arbitrary free primitive to corrupt a pipe_buffer structure and hijack the kernel control flow to escape the container.
D3v17 published an article describing the solution of their corCTF challenge CoRJail.
The PoC exploit used a single null-byte out-of-bounds write to corrupt a poll_list object in the kmalloc-4k slab cache and obtain an arbitrary free primitive.
It allowed the researcher to corrupt a user_key_payload structure and get out-of-bounds read.
Finally the researcher used the arbitrary free primitive to corrupt a pipe_buffer structure and hijack the kernel control flow to escape the container.
[corCTF 2022] CoRJail: From Null Byte Overflow To Docker Escape Exploiting poll_list Objects In The Linux Kernel
CoRJail is a kernel exploitation challenge designed for corCTF 2022. Players were asked to escape from a hardened Docker container with custom seccomp filters exploiting a Off-By-Null vulnerability in a Linux Kernel Module accessible via procfs. With this…
👍7🔥3
DirtyCred
A talk by Zhenpeng Lin about an exploitation technique for memory corruptions called DirtyCred.
The technique works by freeing an unprivileged credentials object via a memory corruption and allocating a privileged one in the same slot.
A talk by Zhenpeng Lin about an exploitation technique for memory corruptions called DirtyCred.
The technique works by freeing an unprivileged credentials object via a memory corruption and allocating a privileged one in the same slot.
Android Universal Root: Exploiting xPU Drivers
A talk about exploiting Android devices with PowerVR GPUs.
A talk about exploiting Android devices with PowerVR GPUs.
👍1