|
Message-Id: <07D12CE0-60AE-4D40-B15F-1F4AB67F1534@gmail.com> Date: Sun, 21 Jul 2019 23:19:56 +0400 From: Ilya Matveychikov <matvejchikov@...il.com> To: lkrg-users@...ts.openwall.com Subject: LKRG 0.7 CI & ED bypass Hello, Nice to see LKRG version 0.7 here, I wonder it is still alive. This time I’d like to use a CHAIN!!11 of 2 by-design bugs in LKRG to show how to bypass both CI and ED: - (1) bypass of CI by locking a “text_mutex” which makes CI stuck on acquiring it, so no CI will be performed - (2) bypass of ED by patching kprobes dispatcher function (get_kprobes), so LKRG-hooks will not be triggered by kprobes Unfortunately, don’t have much time to do proper cleanup for this but as usual I’ve published some code on github so anyone can play with: https://github.com/milabs/kernel-exploits/commits/lkrg0.7-bypass Also, I don’t know how good LKRG SMEP protection is as I don’t have a proper device to make tests but as far as I can see SMEP protection (as well as WP once) is also kprobes-based, so I’m guessing this approach will defeat it as well. Did I miss something? Ilya
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.