Code Monkey home page Code Monkey logo

kernel-exploit-factory's Introduction

kernel-exploit-factory's People

Contributors

bsauce avatar v1negar avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

kernel-exploit-factory's Issues

cve-2022-0995

hello,when I complie exploit.c,it will error:linux/watch_queue.h : no such file or directory,why? I cant solve this.

CVE-2022-1015调试问题

大佬,我使用了你的bzImage加上exp是可以打通的,但是由于缺少vmlinux没办法源码调试,因此我自己编译了一个bzImage,但是exp打不通,因此我猜测是偏移的问题。后续我想调试看看,但是我使用自己编译bzImage以及vmlinux无法打下断点
image
image
我使用的是syzkaller中生成的文件系统
并且我看到你提供的gdb脚本对几个地址打了断点
image
能告诉我这几个地址具体是什么函数嘛?非常感谢。

CVE-2021-22555环境的疑惑

我看CVE-2021-22555的时候,我自己编译内核出现了空指针解引用的错误,但是你编译的内核我执行的时候没有出现这个问题,我想请问一下是需要打开哪个选项呢?
image

CVE-2017-11176

Hello,大佬。请问cve-2017-11176为什么需要执行两次漏洞触发呢,我调试时发现只执行一次sock也会被释放,只是后续利用sendmsg申请不到那个堆块?请问这其中有什么原因吗?

CVE-2022-1015

请问为什么我包含了内核的头文件依然编译错误
image

CVE-2017-7308

hello, in the exp, the address of 'native_write_cr4' is needed, but in linux 4.10.6 source code, this function is inline, so would you please let me know how to get the address of 'native_write_cr4'. thanks a lot!

CVE-2020-8835 - unable to handle page fault for address

你好,我正在尝试复现CVE-2020-8835,但是我遇到了问题。

  1. 我首先使用git上提供环境进行实验:https://github.com/bsauce/kernel-exploit-factory/tree/main/CVE-2020-8835
  2. 我使用你git上提供的bzImage和rootfs.cpio,可以复现/提权成功,感谢~
  3. 我使用另外一个仓库提供的config,自行编译内核:。我注意到该文件,包含defconfig,kvmconfig,bpf所有的相关选项。
  4. 接着,我使用新编译的内核,替换你仓库中的bzImage,重新进行实验。然而,总是page fault,并重启内核。请问,你感觉问题在哪?
  5. 谢谢

PS:由于运行实验室,内核直接重启,我无法重定向输出文字内容的错误。我录屏保存报错过程,它的错误大致如下:

ctrl_mapfd:3, exp_mapfd:4
[+] leak array_map_ops:0xFFFFFFFF98A168C0
[+] leak kernel_base addr:0xFFFFFFFF97A00440
[+] leak exp_map_elem addr:0xFFFFA265DD8B4110
[17.799154] BUG unable to handle page fault for address ffffffff822c26c0
[17.800875] #PF: supervisor read access in kernel mode
[17.802072] #PF:error_code(0x0000) -not-present page
[17.803781] PGC E20D067 P4D e20d067 PUD e20e063 PMD 0
[17.805108] Oops [#1] SMP PTI
[.................] CPU:0 PID:105 Comm:exp_signel_core Not tainted 5.6.0 #1 
....
....
Call Trace:
bpf_obj_get_info_by_fd+0x19d/0x2b0
__do_sys_bpf+0x3fb/0x18b0
do_syscall_64
.....
.....
kernel panic - not syncing : Fault exception
Kernel offset : 0x16a00000 from 0xffffffff81000000 (relocation range : 0xffffffff81000000-0xffffffffbfffffff
Rebort in 1 seconds...

CVE-2022-32250

Sorry to bother you, but I meet some question when testing CVE-2022-32250.
I can run the exploit successfully by using your bzImage, but it won't work when I change to the kernel buit by myself, even it has the same version of yours and I also copy your .config to make it same.
Could you tell me how did you build your kernel file?

CVE-2021-43267

Hello,大佬
最近在调试CVE-2021-43267的TIPC CRYPTO消息溢出漏洞,但是在“5-1 触发TIPC漏洞,篡改msg_msg->m_ts这一步会因为msg_msg消息堆喷的堆块地址不够连续而失败
在增加了堆喷数量后依旧如此
并且我已经关闭了CONFIG_SLAB_FREELIST_RANDOM、CONFIG_SLAB_FREELIST_HARDEND和CONFIG_SHUFFLE_PAGE_ALLOCATOR保护
想请问一下大佬的内核编译选项是怎么设置的,能分享一下么,多谢~

附件中是我的内核编译配置
config.zip

对CVE-2020-8835 exp的疑问

exp硬编码了 0xffffffff822c26c0 地址,这个地址是干什么的?

我在 /proc/kallsyms 没有看到这个地址是哪个函数的

/ # cat /proc/kallsyms | grep 822c26c0

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.