Four Bytes of Power: exploiting CVE-2021-26708 in the Linux kernel
I've published the article about exploiting CVE-2021-26708 for local privilege escalation on Fedora 33 Server for x86_64, bypassing SMEP and SMAP.
https://a13xp0p0v.github.io/2021/02/09/CVE-2021-26708.html
PoC exploit demo video: https://www.youtube.com/watch?v=EC8PFOYOUgU
I've published the article about exploiting CVE-2021-26708 for local privilege escalation on Fedora 33 Server for x86_64, bypassing SMEP and SMAP.
https://a13xp0p0v.github.io/2021/02/09/CVE-2021-26708.html
PoC exploit demo video: https://www.youtube.com/watch?v=EC8PFOYOUgU
Alexander Popov
Four Bytes of Power: Exploiting CVE-2021-26708 in the Linux kernel
CVE-2021-26708 is assigned to five race condition bugs in the virtual socket implementation of the Linux kernel. I discovered and fixed them in January 2021. In this article I describe how to exploit them for local privilege escalation on Fedora 33 Server…
Rust in the Linux kernel
An RFC patch series that adds Rust support to the kernel has been posted. It aims to provide wrappers for the core kernel APIs and allow implementing kernel modules in safe Rust.
The series includes a work-in-progress Rust implementation of the Android binder driver.
See the cover letter for the high-level design outline and the blog post for a deeper explanation of the implementation of an example module.
Cover letter: https://lore.kernel.org/lkml/20210414184604.23473-1-ojeda@kernel.org/
Blog post: https://security.googleblog.com/2021/04/rust-in-linux-kernel.html
An RFC patch series that adds Rust support to the kernel has been posted. It aims to provide wrappers for the core kernel APIs and allow implementing kernel modules in safe Rust.
The series includes a work-in-progress Rust implementation of the Android binder driver.
See the cover letter for the high-level design outline and the blog post for a deeper explanation of the implementation of an example module.
Cover letter: https://lore.kernel.org/lkml/20210414184604.23473-1-ojeda@kernel.org/
Blog post: https://security.googleblog.com/2021/04/rust-in-linux-kernel.html
Google Online Security Blog
Rust in the Linux kernel
Posted by Wedson Almeida Filho, Android Team In our previous post , we announced that Android now supports the Rust programming language...
Stealthily Introducing Vulnerabilities in Open-Source Software via Hypocrite Commits
A research about introducing vulnerabilities into the kernel while pretending to fix bugs. The researchers succeeded.
This research was done last year, but subsequent (seemingly unrelated) work by the same authors is now causing a lot of drama in the Linux kernel community.
Paper: https://github.com/QiushiWu/QiushiWu.github.io/blob/main/papers/OpenSourceInsecurity.pdf
Drama: https://twitter.com/gregkh/status/1384785747874656257
A research about introducing vulnerabilities into the kernel while pretending to fix bugs. The researchers succeeded.
This research was done last year, but subsequent (seemingly unrelated) work by the same authors is now causing a lot of drama in the Linux kernel community.
Paper: https://github.com/QiushiWu/QiushiWu.github.io/blob/main/papers/OpenSourceInsecurity.pdf
Drama: https://twitter.com/gregkh/status/1384785747874656257
GitHub
qiushiwu.github.io/papers/OpenSourceInsecurity.pdf at main · QiushiWu/qiushiwu.github.io
Contribute to QiushiWu/qiushiwu.github.io development by creating an account on GitHub.
A foray into Linux kernel exploitation on Android
An article describing an attempt to exploit the pvrsrvkm driver on an Alcatel 1S 2019.
https://mcyoloswagham.github.io/linux/
An article describing an attempt to exploit the pvrsrvkm driver on an Alcatel 1S 2019.
https://mcyoloswagham.github.io/linux/
mcyoloswagham.github.io
A foray into Linux kernel exploitation on Android
In November of 2020, I decided to dive into the world of Android, more specifically the linux kernel. I did this because earlier in the year, around February, I broke my old phone during a skiing trip and hastily bought a cheap android phone, the Alcatel…
Android Security Bulletin — May 2021
A bug in TTY reported by Jann Horn a while ago and a bunch of bugs in Qualcomm drivers as usual.
https://source.android.com/security/bulletin/2021-05-01#kernel-components
https://bugs.chromium.org/p/project-zero/issues/detail?id=2125&can=1&q=linux%20kernel&colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary&cells=ids&sort=-id
https://source.android.com/security/bulletin/2021-05-01#qualcomm-components
A bug in TTY reported by Jann Horn a while ago and a bunch of bugs in Qualcomm drivers as usual.
https://source.android.com/security/bulletin/2021-05-01#kernel-components
https://bugs.chromium.org/p/project-zero/issues/detail?id=2125&can=1&q=linux%20kernel&colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary&cells=ids&sort=-id
https://source.android.com/security/bulletin/2021-05-01#qualcomm-components
CVE-2021-32606: CAN ISOTP local privilege escalation
Exploiting a race condition in ISOTP CAN sockets.
https://github.com/nrb547/kernel-exploitation/blob/main/cve-2021-32606/cve-2021-32606.md
Exploiting a race condition in ISOTP CAN sockets.
https://github.com/nrb547/kernel-exploitation/blob/main/cve-2021-32606/cve-2021-32606.md
Fuzzing the Linux kernel
The talk I gave about Linux kernel fuzzing at PHDays 2021. Roughly the same content as the Linux Foundation Mentorship talk, but organized differently.
Slides: https://docs.google.com/presentation/d/19JaXHFMT-R2le6x-vPKw5D1Cxlw2aLtxHEIDwWBNXCQ/edit?usp=sharing
Video: https://standoff365.com/phdays10/schedule/tech/fuzzing-the-linux-kernel/
The talk I gave about Linux kernel fuzzing at PHDays 2021. Roughly the same content as the Linux Foundation Mentorship talk, but organized differently.
Slides: https://docs.google.com/presentation/d/19JaXHFMT-R2le6x-vPKw5D1Cxlw2aLtxHEIDwWBNXCQ/edit?usp=sharing
Video: https://standoff365.com/phdays10/schedule/tech/fuzzing-the-linux-kernel/
Google Docs
2021, PHDays: Fuzzing the Linux kernel
Fuzzing the Linux kernel Andrey Konovalov, xairy.io May 20th 2021
Four Bytes of Power: Exploiting CVE-2021-26708 in the Linux Kernel
I've published the video of my talk for Zer0Con 2021: https://m.youtube.com/watch?v=EMcjHfceX44
And I gave this talk in Russian for live audience at PHDays 2021. Video: https://standoff365.com/phdays10/schedule/tech/4-bytes-of-power-exploiting-cve-2021-26708-in-the-linux-kernel
I've published the video of my talk for Zer0Con 2021: https://m.youtube.com/watch?v=EMcjHfceX44
And I gave this talk in Russian for live audience at PHDays 2021. Video: https://standoff365.com/phdays10/schedule/tech/4-bytes-of-power-exploiting-cve-2021-26708-in-the-linux-kernel
YouTube
Four Bytes of Power: Exploiting CVE-2021-26708 in the Linux Kernel
My talk at Zer0Con 2021.
Abstract:
CVE-2021-26708 is assigned to five race condition bugs in the virtual socket implementation of the Linux kernel. These vulnerabilities were discovered and fixed by Alexander Popov. In this talk, he will describe how to…
Abstract:
CVE-2021-26708 is assigned to five race condition bugs in the virtual socket implementation of the Linux kernel. These vulnerabilities were discovered and fixed by Alexander Popov. In this talk, he will describe how to…
A Nerve-Racking Bug Collision in Samsung's NPU Driver
An exploit write-up by Gyorgy Miru for another bug in the Samsung NPU driver. Unlike the vmalloc-based exploits published by P0 and others, this one relies on a race condition leading to a slab-out-of-bounds write.
https://labs.taszk.io/articles/post/bug_collision_in_samsungs_npu_driver/
An exploit write-up by Gyorgy Miru for another bug in the Samsung NPU driver. Unlike the vmalloc-based exploits published by P0 and others, this one relies on a race condition leading to a slab-out-of-bounds write.
https://labs.taszk.io/articles/post/bug_collision_in_samsungs_npu_driver/
labs.taszk.io
[BugTales] A Nerve-Racking Bug Collision in Samsung's NPU Driver
Last summer I have discovered several vulnerabilities in the implementation of Samsung's NPU device driver. While I was working on completing my proof of concept exploit
CVE-2021–20226: a reference counting bug which leads to local privilege escalation in io_uring
An article describing a bug in the io_uring subsystem. Improper handling of files_struct references leading to a use-after-free.
https://flattsecurity.medium.com/cve-2021-20226-a-reference-counting-bug-which-leads-to-local-privilege-escalation-in-io-uring-e946bd69177a
An article describing a bug in the io_uring subsystem. Improper handling of files_struct references leading to a use-after-free.
https://flattsecurity.medium.com/cve-2021-20226-a-reference-counting-bug-which-leads-to-local-privilege-escalation-in-io-uring-e946bd69177a
Medium
CVE-2021–20226 a reference counting bug which leads to local privilege escalation in io_uring.
Hello, I’m Shiga( @Ga_ryo_ ), a security engineer at Flatt Security Inc.
An EPYC escape: Case-study of a KVM breakout by Felix Wilhelm
KVM guest-to-host breakout via access to the host MSRs.
https://googleprojectzero.blogspot.com/2021/06/an-epyc-escape-case-study-of-kvm.html?m=1
KVM guest-to-host breakout via access to the host MSRs.
https://googleprojectzero.blogspot.com/2021/06/an-epyc-escape-case-study-of-kvm.html?m=1
Blogspot
An EPYC escape: Case-study of a KVM breakout
Posted by Felix Wilhelm, Project Zero Introduction KVM (for Kernel-based Virtual Machine) is the de-facto standard hypervisor for Linux-...
Linux Kernel Heap Out-Of-Bounds Write in xt_compat_target_from_user()
Very old vulnerability, it can be exploited for LPE. Kernels starting from v2.6.19 are affected.
https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528
Very old vulnerability, it can be exploited for LPE. Kernels starting from v2.6.19 are affected.
https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528
KMSAN, a look under the hood
A talk about the internals of KernelMemorySanitizer — a tool that finds uses of uninitialized memory and information leaks. By Alexander Potapenko.
Recording: https://www.youtube.com/watch?v=LNs2U-3m3yg
Slides: https://github.com/ramosian-glider/talks-and-presentations/blob/master/2021/KernelMemorySanitizer_a_look_under_the_hood.pdf
A talk about the internals of KernelMemorySanitizer — a tool that finds uses of uninitialized memory and information leaks. By Alexander Potapenko.
Recording: https://www.youtube.com/watch?v=LNs2U-3m3yg
Slides: https://github.com/ramosian-glider/talks-and-presentations/blob/master/2021/KernelMemorySanitizer_a_look_under_the_hood.pdf
YouTube
KMSAN, a look under the hood
Alexander Potapenko from Google Munich give a talk at FaMAF-UNC in Argentina about his new huge-patchset to detect uninitialized memory in the Linux kernel, KMSAN.
Alexander was invited by Eclypsium and the low-level subjects of the CS degree in FaMAF-UNC.…
Alexander was invited by Eclypsium and the low-level subjects of the CS degree in FaMAF-UNC.…
Exploitation of a double free vulnerability in Ubuntu shiftfs driver
A very detailed article by Vincent Dehors. The author describes his exploit for Pwn2Own Vancouver, where he got LPE on Ubuntu Groovy 20.10.
https://www.synacktiv.com/publications/exploitation-of-a-double-free-vulnerability-in-ubuntu-shiftfs-driver-cve-2021-3492.html
A very detailed article by Vincent Dehors. The author describes his exploit for Pwn2Own Vancouver, where he got LPE on Ubuntu Groovy 20.10.
https://www.synacktiv.com/publications/exploitation-of-a-double-free-vulnerability-in-ubuntu-shiftfs-driver-cve-2021-3492.html
Synacktiv
Exploitation of a double free vulnerability in Ubuntu shiftfs driver
CVE-2021-22555: Turning \x00\x00 into 10000$ by Andy Nguyen
CVE-2021-22555 is a 15 years old heap out-of-bounds write vulnerability in Linux Netfilter that is powerful enough to bypass all modern security mitigations and achieve kernel code execution. It was used to break the kubernetes pod isolation of the kCTF cluster and won 10000$.
https://google.github.io/security-research/pocs/linux/cve-2021-22555/writeup.html
Amazingly, Andy independently reinvented the msgsnd() exploitation technique, that I created in January for my CVE-2021-26708 exploit:
https://a13xp0p0v.github.io/2021/02/09/CVE-2021-26708.html
CVE-2021-22555 is a 15 years old heap out-of-bounds write vulnerability in Linux Netfilter that is powerful enough to bypass all modern security mitigations and achieve kernel code execution. It was used to break the kubernetes pod isolation of the kCTF cluster and won 10000$.
https://google.github.io/security-research/pocs/linux/cve-2021-22555/writeup.html
Amazingly, Andy independently reinvented the msgsnd() exploitation technique, that I created in January for my CVE-2021-26708 exploit:
https://a13xp0p0v.github.io/2021/02/09/CVE-2021-26708.html
security-research
CVE-2021-22555: Turning \x00\x00 into 10000$
This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code.
Sequoia: A deep root in Linux's filesystem layer (CVE-2021-33909)
Qualys security advisory about a size_t-to-int conversion vulnerability in the Linux kernel's filesystem layer.
By creating, mounting, and deleting a deep directory structure whose total path length exceeds 1GB, an unprivileged local attacker can write the 10-byte string "//deleted" to an offset of exactly -2GB-10B below the beginning of a vmalloc()ated kernel buffer.
Report: https://www.openwall.com/lists/oss-security/2021/07/20/1
Qualys security advisory about a size_t-to-int conversion vulnerability in the Linux kernel's filesystem layer.
By creating, mounting, and deleting a deep directory structure whose total path length exceeds 1GB, an unprivileged local attacker can write the 10-byte string "//deleted" to an offset of exactly -2GB-10B below the beginning of a vmalloc()ated kernel buffer.
Report: https://www.openwall.com/lists/oss-security/2021/07/20/1
Kernel Pwning with eBPF: a Love Story by Valentina Palmiotti
The detailed overview of eBPF from the exploit developer's perspective and the analysis of the CVE-2021-3490 exploit for Ubuntu 20.10.
https://www.graplsecurity.com/post/kernel-pwning-with-ebpf-a-love-story
The detailed overview of eBPF from the exploit developer's perspective and the analysis of the CVE-2021-3490 exploit for Ubuntu 20.10.
https://www.graplsecurity.com/post/kernel-pwning-with-ebpf-a-love-story
[BugTales] Da Vinci Hits a Nerve: Exploiting Huawei’s NPU Driver by Gyorgy Miru
A detailed article about exploiting vulnerabilities in the Linux kernel driver for Huawei Neural-network Processing Unit.
https://labs.taszk.io/articles/post/exploiting_huaweis_npu_driver/
A detailed article about exploiting vulnerabilities in the Linux kernel driver for Huawei Neural-network Processing Unit.
https://labs.taszk.io/articles/post/exploiting_huaweis_npu_driver/
labs.taszk.io
[BugTales] Da Vinci Hits a Nerve: Exploiting Huawei’s NPU Driver
A deep dive into the exploitation of Huawei's NPU kernel driver
Variant analysis of the 'Sequoia' bug
Using CodeQL to rediscover the Sequoia bug recently disclosed by Qualys. As well as finding a few other ones. By Jordy Zomer.
https://pwning.systems/posts/sequoia-variant-analysis/
Using CodeQL to rediscover the Sequoia bug recently disclosed by Qualys. As well as finding a few other ones. By Jordy Zomer.
https://pwning.systems/posts/sequoia-variant-analysis/
pwning.systems
Variant analysis of the 'Sequoia' bug
I imagine we've all heard about the recent 'Sequoia' bug discovered by the Qualys Research team. It's a fascinating bug so I decided to do variant analysis using CodeQL!
Fuzzing Linux with Xen
A DEF CON talk about fuzzing the Linux kernel over DMA-based interfaces with Xen. By Tamas K Lengyel.
Video: https://www.youtube.com/watch?v=_dXC_I2ybr4
Slides: https://media.defcon.org/DEF%20CON%2029/DEF%20CON%2029%20presentations/Tamas%20K%20Lengyel%20-%20Fuzzing%20Linux%20with%20Xen.pdf
A DEF CON talk about fuzzing the Linux kernel over DMA-based interfaces with Xen. By Tamas K Lengyel.
Video: https://www.youtube.com/watch?v=_dXC_I2ybr4
Slides: https://media.defcon.org/DEF%20CON%2029/DEF%20CON%2029%20presentations/Tamas%20K%20Lengyel%20-%20Fuzzing%20Linux%20with%20Xen.pdf
YouTube
DEF CON 29 - Tamas K Lengyel - Fuzzing Linux with Xen
Last year we've successfully upstreamed a new feature to Xen that allows high-speed fuzzing of virtual machines (VMs) using VM-forking. Recently through collaboration with the Xen community external monitoring of VMs via Intel(r) Processor Trace has also…
Linux Security Summit 2021
The schedule for Linux Security Summit has been published. The summit will be happening from Sep 29th to Oct 1st.
I'll be giving a talk about the new MTE-based KASAN mode on the last day.
The schedule for Linux Security Summit has been published. The summit will be happening from Sep 29th to Oct 1st.
I'll be giving a talk about the new MTE-based KASAN mode on the last day.
LF Events
Schedule | LF Events
All session times are listed below in Mountain Daylight Time (PDT). To view the schedule at your preferred time, please choose your location on the right-hand navigation panel under “Timezone”.