Linux Kernel: Exploiting a Netfilter Use-after-Free in kmalloc-cg
Sergi Martinez published an article about exploiting CVE-2022-32250, a slab use-after-free in the netfilter subsystem. Unlike the existing public exploits for this bug, Sergi's exploit targets the kernel version 5.18.1, where both the vulnerable object and msg_msg are allocated in kmalloc-cg-* slab caches.
Sergi Martinez published an article about exploiting CVE-2022-32250, a slab use-after-free in the netfilter subsystem. Unlike the existing public exploits for this bug, Sergi's exploit targets the kernel version 5.18.1, where both the vulnerable object and msg_msg are allocated in kmalloc-cg-* slab caches.
Exodus Intelligence
Linux Kernel: Exploiting a Netfilter Use-after-Free in kmalloc-cg - Exodus Intelligence
By Sergi Martinez Overview It’s been a while since our last technical blogpost, so here’s one right on time for the Christmas holidays. We describe a method to exploit a use-after-free in the Linux kernel when objects are allocated in a specific slab cache…
🔥8👍5
DirtyCred Remastered: how to turn an UAF into Privilege Escalation
LukeGix and Alessandro Groppo published two articles about exploiting CVE-2022-2602, another use-after-free in the io_uring subsystem.
They used inode locking for pausing a kernel thread during UAF exploitation. To escalate privileges, the researchers employed the DirtyCred file exploitation technique.
LukeGix and Alessandro Groppo published two articles about exploiting CVE-2022-2602, another use-after-free in the io_uring subsystem.
They used inode locking for pausing a kernel thread during UAF exploitation. To escalate privileges, the researchers employed the DirtyCred file exploitation technique.
LukeGix
DirtyCred Remastered
DirtyCred Remastered: how to turn an UAF into Privilege Escalation
🔥9👍3
Exploiting null-dereferences in the Linux kernel
Seth Jenkins published an article about turning a refcount incrementing side-effect of a null-deref kernel bug into a slab double-free.
Seth Jenkins published an article about turning a refcount incrementing side-effect of a null-deref kernel bug into a slab double-free.
projectzero.google
Exploiting null-dereferences in the Linux kernel - Project Zero
Posted by Seth Jenkins, Project Zero For a fair amount of time, null-deref bugs were a highly exploitable kernel bug class. Back when the kernel was able t...
👍9🔥4
Pwning the all Google phone with a non-Google bug
An article by Man Yue Mo about getting root from the untrusted app domain on Pixel 6 via a slab use-after-free in the Arm Mali GPU driver.
The researcher also points out a patch gap in Android and provides a list of bugs that were exploitable for months after becoming public.
An article by Man Yue Mo about getting root from the untrusted app domain on Pixel 6 via a slab use-after-free in the Arm Mali GPU driver.
The researcher also points out a patch gap in Android and provides a list of bugs that were exploitable for months after becoming public.
The GitHub Blog
Pwning the all Google phone with a non-Google bug
It turns out that the first “all Google” phone includes a non-Google bug. Learn about the details of CVE-2022-38181, a vulnerability in the Arm Mali GPU. Join me on my journey through reporting the vulnerability to the Android security team, and the exploit…
👍12
The code that wasn't there: Reading memory on an Android device by accident
An article by Man Yue Mo about exploiting a missing cache flush in the Qualcomm Adreno GPU driver.
The author showed how to use the bug to leak kernel memory and bypass KASLR on Android.
An article by Man Yue Mo about exploiting a missing cache flush in the Qualcomm Adreno GPU driver.
The author showed how to use the bug to leak kernel memory and bypass KASLR on Android.
The GitHub Blog
The code that wasn't there: Reading memory on an Android device by accident
CVE-2022-25664, a vulnerability in the Qualcomm Adreno GPU, can be used to leak large amounts of information to a malicious Android application. Learn more about how the vulnerability can be used to leak information in both the user space and kernel space…
🔥4😱4👍3
Rooting the FiiO M6
Jack Maginnes published two articles about finding and exploiting a stack buffer-overflow in the old Android-based FiiO M6 MP3 player.
Jack Maginnes published two articles about finding and exploiting a stack buffer-overflow in the old Android-based FiiO M6 MP3 player.
Stigward’s Security Journal
Rooting the FiiO M6 - Part 1 - Using the “World’s Worst Fuzzer” To Find A Kernel Bug
Overview: A few months ago, I was cleaning off my hardware workbench when I came across my FiiO M6, an Android-based “portable high-resolution lossless music player”. I originally purchased the device to aid in my language learning studies and dabble in the…
👍6
Pwning Pixel 6 with a leftover patch
An article by Man Yue Mo about exploiting a logical bug in the Arm Mali GPU driver on Pixel 6.
Man Yue Mo used the bug to make GPU access freed memory and gained root from the untrusted_app context.
An article by Man Yue Mo about exploiting a logical bug in the Arm Mali GPU driver on Pixel 6.
Man Yue Mo used the bug to make GPU access freed memory and gained root from the untrusted_app context.
The GitHub Blog
Pwning Pixel 6 with a leftover patch
In this post, I’ll look at a security-related change in version r40p0 of the Arm Mali driver that was AWOL in the January update of the Pixel bulletin, where other patches from r40p0 was applied, and how these two lines of changes can be exploited to gain…
👍8
Privilege escalation exploit for CVE-2023-0386 in OverlayFS
A privilege escalation exploit by xkaneiki for a logical bug in OverlayFS. Exploitation requires unprivileged user namespaces enabled.
Following the exploit, Ryan Simon et al. published an article describing the exploitation process.
A privilege escalation exploit by xkaneiki for a logical bug in OverlayFS. Exploitation requires unprivileged user namespaces enabled.
Following the exploit, Ryan Simon et al. published an article describing the exploitation process.
GitHub
GitHub - xkaneiki/CVE-2023-0386: CVE-2023-0386在ubuntu22.04上的提权
CVE-2023-0386在ubuntu22.04上的提权. Contribute to xkaneiki/CVE-2023-0386 development by creating an account on GitHub.
👍8
Racing Against the Lock: Exploiting Spinlock UAF in the Android Kernel
A talk (slides) by Moshe Kol about exploiting a slab use-after-free bug in the Android Binder IPC.
The exploit achieves kernel arbitrary read/write primitives from the unstrusted_app context and obtains root privileges on Pixel 6.
Moshe also published an article about their exploit.
A talk (slides) by Moshe Kol about exploiting a slab use-after-free bug in the Android Binder IPC.
The exploit achieves kernel arbitrary read/write primitives from the unstrusted_app context and obtains root privileges on Pixel 6.
Moshe also published an article about their exploit.
YouTube
OffensiveCon23 - Moshe Kol - Racing Against the Lock: Exploiting Spinlock UAF in the Android Kernel
https://www.offensivecon.org/speakers/2023/moshe-kol.html
👍8🔥5
Exploit Engineering – Attacking the Linux Kernel
A talk (slides) by Alex Plaskett and Cedric Halbronn about approaches to finding, triaging, and exploiting Linux kernel bugs.
During the talk, the speakers announced libslub — a GDB extension for examining SLUB object addresses and metadata.
A talk (slides) by Alex Plaskett and Cedric Halbronn about approaches to finding, triaging, and exploiting Linux kernel bugs.
During the talk, the speakers announced libslub — a GDB extension for examining SLUB object addresses and metadata.
YouTube
OffensiveCon23 - Alex Plaskett & Cedric Halbronn - Exploit Engineering – Attacking the Linux Kernel
https://www.offensivecon.org/speakers/2023/alex-plaskett-and-cedric-halbronn.html
👍11🔥3
Abusing Linux In-Kernel SMB Server to Gain Kernel Remote Code Execution
A talk by Guillaume Teissier and Quentin Minster about remotely exploiting two slab corruption bugs in the KSMBD module.
The exploit achieves remote code execution but requires having valid SMB authentication credentials to trigger the bugs.
A talk by Guillaume Teissier and Quentin Minster about remotely exploiting two slab corruption bugs in the KSMBD module.
The exploit achieves remote code execution but requires having valid SMB authentication credentials to trigger the bugs.
YouTube
OffensiveCon23 - Guillaume Teissier and Quentin Minster
Abusing Linux In-Kernel SMB Server to Gain Kernel Remote Code Execution
https://www.offensivecon.org/speakers/2023/guillaume-teissier-and-quentin-minster.html
https://www.offensivecon.org/speakers/2023/guillaume-teissier-and-quentin-minster.html
🔥2🤔1
Rooting with root cause: finding a variant of a Project Zero bug
Yet another article by Man Yue Mo about exploiting the Arm Mali GPU driver.
Man Yue Mo used a race condition bug to make GPU access freed memory and gained root from the untrusted_app context on Pixel 6.
Yet another article by Man Yue Mo about exploiting the Arm Mali GPU driver.
Man Yue Mo used a race condition bug to make GPU access freed memory and gained root from the untrusted_app context on Pixel 6.
The GitHub Blog
Rooting with root cause: finding a variant of a Project Zero bug
In this blog, I’ll look at CVE-2022-46395, a variant of CVE-2022-36449 (Project Zero issue 2327), and use it to gain arbitrary kernel code execution and root privileges from the untrusted app domain on an Android phone that uses the Arm Mali GPU. I’ll also…
👍4
CVE-2023-2008 - Analyzing and exploiting a bug in the udmabuf driver
An article about exploiting a logical bug in the fault handler implementation of udmabuf mappings.
The exploit shared by Eloi Sanfelix gains root on Ubuntu. Triggering the bug requires the user to be in the kvm group.
An article about exploiting a logical bug in the fault handler implementation of udmabuf mappings.
The exploit shared by Eloi Sanfelix gains root on Ubuntu. Triggering the bug requires the user to be in the kvm group.
labs.bluefrostsecurity.de
CVE-2023-2008 - Analyzing and exploiting a bug in the udmabuf driver | Bluefrostsecurity
🔥5👍1🤔1🎉1
Breaking the Code - Exploiting and Examining CVE-2023-1829 in cls_tcindex Classifier Vulnerability
An article by Vu Thi Lan about exploiting a slab use-after-free bug in the netfilter subsystem.
The shared exploit gains root on Ubuntu.
An article by Vu Thi Lan about exploiting a slab use-after-free bug in the netfilter subsystem.
The shared exploit gains root on Ubuntu.
STAR Labs
Breaking the Code - Exploiting and Examining CVE-2023-1829 in cls_tcindex Classifier Vulnerability
Background The discovery and analysis of vulnerabilities is a critical aspect of cybersecurity research. Today, we will dive into CVE-2023-1829, a vulnerability in the cls_tcindex network traffic classifier found by Valis. We will explore the process of exploiting…
🔥10👍2
UNCONTAINED: Uncovering Container Confusion in the Linux Kernel
A paper (overview) by Jakob Koschel, Pietro Borrello, et al. about finding type confusion bugs in container_of invocations.
A paper (overview) by Jakob Koschel, Pietro Borrello, et al. about finding type confusion bugs in container_of invocations.
🔥14👍3🎉1
Dirty Pagetable: A Novel Exploitation Technique To Rule Linux Kernel
An article by Nicolas Wu about the Dirty Pagetable exploitation technique.
Dirty Pagetable enables using a slab bug to overwrite userspace Page Table Entries and gain arbitrary read/write access to physical memory.
To demonstrate the technique, Nicolas Wu and Ye Zhang wrote a few exploits, including one for CVE-2023-21400, a racy slab double-free in the io_uring subsystem. The exploit gains root on Pixel 7.
An article by Nicolas Wu about the Dirty Pagetable exploitation technique.
Dirty Pagetable enables using a slab bug to overwrite userspace Page Table Entries and gain arbitrary read/write access to physical memory.
To demonstrate the technique, Nicolas Wu and Ye Zhang wrote a few exploits, including one for CVE-2023-21400, a racy slab double-free in the io_uring subsystem. The exploit gains root on Pixel 7.
👍14🔥4
No CVE for this bug which has never been in the official kernel
Javier P Rufo published an article about exploiting a slab use-after-free bug in the ptrace subsystem via a cross-cache attack.
Javier P Rufo published an article about exploiting a slab use-after-free bug in the ptrace subsystem via a cross-cache attack.
👏6👍1
A new method for container escape using file-based DirtyCred
An article by Choo Yi Kai about escaping a Docker container by overwriting /proc/sys/kernel/modprobe via the DirtyCred exploitation technique.
The article also describes a way to delay the page fault handler via FALLOC_FL_PUNCH_HOLE for winning a race condition, similar to the commonly-used userfaultfd and FUSE–based techniques.
An article by Choo Yi Kai about escaping a Docker container by overwriting /proc/sys/kernel/modprobe via the DirtyCred exploitation technique.
The article also describes a way to delay the page fault handler via FALLOC_FL_PUNCH_HOLE for winning a race condition, similar to the commonly-used userfaultfd and FUSE–based techniques.
STAR Labs
A new method for container escape using file-based DirtyCred
Recently, I was trying out various exploitation techniques against a Linux kernel vulnerability, CVE-2022-3910. After successfully writing an exploit which made use of DirtyCred to gain local privilege escalation, my mentor Billy asked me if it was possible…
👍7
StackRot (CVE-2023-3269): Linux kernel privilege escalation vulnerability
An article by Ruihan Li about exploiting StackRot — a locking bug in the virtual memory management subsystem that leads to a UAF-by-RCU vulnerability.
The author also shared an exploit that acquires root privileges in the Google kCTF challenge.
An article by Ruihan Li about exploiting StackRot — a locking bug in the virtual memory management subsystem that leads to a UAF-by-RCU vulnerability.
The author also shared an exploit that acquires root privileges in the Google kCTF challenge.
GitHub
GitHub - lrh2000/StackRot: CVE-2023-3269: Linux kernel privilege escalation vulnerability
CVE-2023-3269: Linux kernel privilege escalation vulnerability - lrh2000/StackRot
👏4👍2🔥2
GameOver(lay): Easy-to-exploit local privilege escalation vulnerabilities in Ubuntu Linux
An article by Sagi Tzadik and Shir Tamari about finding and exploiting two logical bugs in the OverlayFS implementation on Ubuntu kernels.
An article by Sagi Tzadik and Shir Tamari about finding and exploiting two logical bugs in the OverlayFS implementation on Ubuntu kernels.
wiz.io
GameOverlay Vulnerability Impacts 40% of Ubuntu Workloads | Wiz Blog
Wiz Research discovers CVE-2023-2640 & CVE-2023-32629, 2 privilege escalation vulnerabilities in Ubuntu's OverlayFS module impacting 40% of cloud workloads.
👍4