A little secret to rock your YouTube subscribers
Get Free YouTube Subscribers, Views and Likes

Linux Kernel Exploitation with Maxwell Bland

Follow
SIGPwny

Join Maxwell Bland, recent PhD graduate from UIUC, for a talk about contemporary Linux kernel exploitation strategies!

The last five years have introduced extensive new subsystems to common Linux kernel downstreams, such as BPF, EROFS filesystems, and selfpatching code. These new systems have introduced novel, unsolved threat vectors for the Linux kernels, and exploit chains targeting these subsystems are further exacerbated by existing exploits techniques targeting writable resources such as file operations structures, TRNG device pointers, and MMIO registers. While pointpatches can and do mitigate a number of attack vectors, these do not systematically harden kernel maintenance procedures and infrastructure, resulting in the continued publicization of new exploits leveraging old techniques. This presentation dissects the anatomy of three recent highprofile kernel exploits and their mitigations, then rediscovers a number of memory management assumptions and microarchitecturelevel kernel modifications (e.g. BPFCFI) necessary to guarantee kernel security moving into the next decade. It ends by discussing a number of emerging exploit paths, steps for effective Linux kernel patch submissions and testing, and larger issues regarding the incorporation of patches into downstream projects like Android.

Meeting slides: https://sigpwny.com/meetings/sp2024/2...

posted by paszczaxp