Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add CVE-2023-6932 #76

Merged
merged 2 commits into from
May 29, 2024
Merged

Add CVE-2023-6932 #76

merged 2 commits into from
May 29, 2024

Conversation

liona24
Copy link
Contributor

@liona24 liona24 commented Jan 22, 2024

No description provided.

@liona24 liona24 marked this pull request as ready for review January 22, 2024 08:50
@liona24
Copy link
Contributor Author

liona24 commented Jan 22, 2024

Hey. The backup_artifacts step seems to be always failing. Not sure what I can do about it. I first created a draft PR and thought it was because of it, but re-running the checks on the real PR did not seem to resolve the issue.

@koczkatamas koczkatamas added the recheck Triggers kernelCTF PR verification again label Feb 2, 2024
@koczkatamas
Copy link
Collaborator

Hey! Sorry, the backup_artifacts step failed because a bug on our part. I am running the checks again - hopefully now everything will be successful.

@JordyZomer
Copy link
Collaborator

Hey @liona24, thanks for your submission! In the exploit documentation it was a bit unclear that the timer_list function gets called with a reference to the timer structure. Making it a bit hard to follow the __register_binfmt part, in the end we figured it out but could you make some changes to the documentation so that's a bit clearer to other folks who want to learn from this exploit :) Other than that it looks good!

@liona24
Copy link
Contributor Author

liona24 commented May 21, 2024

Hey @JordyZomer , thanks for having a look. I did some changes to the documentation hopefully addressing your feedback, feel free to have a look again :)

@JordyZomer JordyZomer merged commit 422d0c3 into google:master May 29, 2024
5 checks passed
@wxj7king
Copy link

Hey! @liona24 , thanks for your amazing work! I'm trying to learn and reproduce this exp, but I have some problems and wanna ask you for some advice :)
The bug triggering and heap spray work perfectly, but I noticed that rbx register actually points to the first byte of the struct linux_binprm instead of the buf member within this struct, where the contents of our /tmp/__rop_chain reside. After setting a breakpoint in GDB to the call to linux_binfmt.load_binary, I found that the pointer to the memory read (i.e. buf) is stored in r14 register which means I cannot use push rbx; pop rsp for stack pivot. Even worse, I haven't found a usable gadget to move the value in r14 to rsp.
So are there any other requirements like specific kernel versions (I used v5.10.90 in qemu), kernel config options or compilers? Or wether this difference is caused by the COS environment? Thanks!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
recheck Triggers kernelCTF PR verification again
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants