Advertisement · 728 × 90

Posts by Linux Kernel Security

Walkthrough of an N-day Android GPU driver vulnerability - Angus, BSides Canberra 2025
Walkthrough of an N-day Android GPU driver vulnerability - Angus, BSides Canberra 2025 YouTube video by BSides Canberra

Walkthrough of an N-day Android GPU driver vulnerability

Talk by Angus about analyzing CVE-2022-22706 — a logical bug in the Mali GPU driver that allows getting write access to read-only memory.

www.youtube.com/watch?v=G71d...

3 days ago 0 0 0 0
GitHub - lukasmaar/kernelsnitch Contribute to lukasmaar/kernelsnitch development by creating an account on GitHub.

The attack allows leaking addresses of exploitation-relevant kernel allocations.

Lukas also published the source code for executing the attack.

github.com/lukasmaar/ke...

4 days ago 0 0 0 0
Post image

From KernelSnitch to Practical msg_msg/pipe_buffer Heap KASLR Leaks

Article by Lukas Maar about evaluating the KernelSnitch timing side-channel attack on a variety of systems, including Android.

lukasmaar.github.io/posts/heap-k...

4 days ago 1 2 1 0

The LLM was used to discover multiple 0-days in the Linux kernel and also write privilege escalation exploits for a few previously known vulnerabilities; the article provides a detailed write-up for two such exploits.

6 days ago 0 0 0 0
Post image

Assessing Claude Mythos Preview’s cybersecurity capabilities

Article by Nicholas Carlini et. al about the security research capabilities of the new Anthropic's LLM called Claude Mythos Preview.

red.anthropic.com/2026/mythos-...

6 days ago 0 0 1 0

The new mode leverages a Clang 22 feature called "allocation tokens". Unlike RANDOM_KMALLOC_CACHES, this mode deterministically assigns caches to allocations based on their types, and not allocation sites.

1 week ago 0 0 0 0
Post image

slab: support for compiler-assisted type-based slab cache partitioning

Marco Elver posted a kernel patch that provides an alternative mode to RANDOM_KMALLOC_CACHES called TYPED_KMALLOC_CACHES.

lore.kernel.org/all/20260331...

1 week ago 0 0 1 0
Post image

CrackArmor: Multiple vulnerabilities in AppArmor

Article about a variety of vulnerabilities found in the AppArmor LSM implementation, including a few kernel memory corruptions. Authors exploited them to achieve LPE on Ubuntu and Debian.

cdn2.qualys.com/advisory/202...

1 week ago 1 0 0 0
Advertisement
Preview
Add kernelCTF CVE-2025-38617_mitigation_cos by quanggle97 · Pull Request #339 · google/security-research

The implemented exploit was used to pwn the kernelCTF mitigation-v4-6.6 instance. The exploit bypasses CONFIG_RANDOM_KMALLOC_CACHES and CONFIG_SLAB_VIRTUAL.

github.com/google/secur...

1 month ago 0 0 0 0
Post image

A Race Within A Race: Exploiting CVE-2025-38617 in Linux Packet Sockets

Excellent article by Quang Le about exploiting CVE-2025-38617 — a race condition that leads to a use-after-free in the packet sockets implementation.

blog.calif.io/p/a-race-wit...

1 month ago 1 2 1 0
Post image

Analysis of Linux kernel bug fixes

Jenny Guanni Qu posted a detailed analysis:

— Kernel bugs hide for 2 years on average. Some hide for 20.

pebblebed.com/blog/kernel-...

— Who Writes the Bugs? A Deeper Look at 125,000 Kernel Vulnerabilities

pebblebed.com/blog/kernel-...

1 month ago 0 0 0 0

The researcher glitched the setresuid syscall handler to bypass its checks and obtain the UID of 0. Bypassing SELinux via glitching remains to be investigated.

2 months ago 1 0 0 0
Hardwear.io NL 2025: Glitching Google's TV Streamer From Adb To Root - Niek Timmers
Hardwear.io NL 2025: Glitching Google's TV Streamer From Adb To Root - Niek Timmers YouTube video by hardwear.io

setresuid(⚡): Glitching Google's TV Streamer from adb to root.

Talk by Niek Timmers about glitching the kernel of the Android-based Google TV Streamer device to escalate privileges via Electromagnetic Fault Injection.

Video: www.youtube.com/watch?v=-w5m...
Slides: hardwear.io/netherlands-...

2 months ago 1 0 1 0
Preview
[Cryptodev-linux] Page-level UAF exploitation IntroductionIn november 2025 I started a fuzzing campaign against cryptodev-linux as part of a school project. I found +10 bugs (UAF, NULL pointer dereferences and integer overflows) and among all of

[Cryptodev-linux] Page-level UAF exploitation

nasm_re posted an article about exploiting a page-level UAF in the out-of-tree cryptodev-linux driver. The researcher modified struct file sprayed into a freed page to escalate privileges.

nasm.re/posts/crypto...

2 months ago 3 1 0 0

Authors found multiple Android vendor drivers affected by the issue. They also wrote an exploit for the IMG DXT GPU driver to escalate privileges on Pixel 10.

2 months ago 0 0 0 0
Advertisement
POC2025 | Dirty Ptrace: Exploiting Undocumented Behaviors in Kernel mmap Handlers
POC2025 | Dirty Ptrace: Exploiting Undocumented Behaviors in Kernel mmap Handlers YouTube video by POC2026

Dirty Ptrace: Exploiting Undocumented Behaviors in Kernel mmap Handlers

Talk by Xingyu Jin & Martijn Bogaard about a new type of logical bugs in kernel driver mmap handlers exploitable via the ptrace functionality.

Video: www.youtube.com/watch?v=yAUJ...
Slides: powerofcommunity.net/2025/slide/x...

2 months ago 1 0 1 0
A 0-click exploit chain for the Pixel 9 Part 1: Decoding Dolby - Project Zero Over the past few years, several AI-powered features have been added to mobile phones that allow users to better search and understand their messages. One ef...

Seth used the bug to escalate privileges from the mediacodec SELinux context and obtain root on Pixel 9.

This exploit is a part of an RCE chain developed by Seth and @natashenka.bsky.social.

projectzero.google/2026/01/pixe...

2 months ago 0 0 0 0
Post image

A 0-click exploit chain for the Pixel 9 Part 2: Cracking the Sandbox with a Big Wave

Article by Seth Jenkins about exploiting a use-after-free in the driver for BigWave — an AV1 decoding hardware component present on Pixel SOCs.

projectzero.google/2026/01/pixe...

2 months ago 1 0 1 0
Preview
CVE-2025-38352 (Part 3) - Uncovering Chronomaly Walking through the exploit development process of the Chronomaly exploit for CVE-2025-38352.

Part 3️⃣ shows a complex PoC exploit for the UAF caused by this race condition:

faith2dxy.xyz/2026-01-03/c...

3 months ago 0 0 0 0
Preview
CVE-2025-38352 (Part 2) - Extending The Race Window Without a Kernel Patch Improving the PoC from the part 1 by extending the race window from userland.

Part 2️⃣ explains how to extend the race window (a period of time when the race can be triggered):

faith2dxy.xyz/2025-12-24/c...

3 months ago 0 0 1 0
Preview
CVE-2025-38352 (Part 1) - In-the-wild Android Kernel Vulnerability Analysis + PoC Analyzing and writing a PoC for CVE-2025-38352.

Article series about exploiting CVE-2025-38352

Faith posted three articles about exploiting a race condition in the implementation of POSIX CPU timers.

Part 1️⃣ describes reproducing this race condition:

faith2dxy.xyz/2025-12-22/c...

3 months ago 0 0 1 0
Preview
悬挂的指针、脆弱的内存──从一个未公开的漏洞到 Pixel 9 Pro 提权 GPU 驱动由于其与内存管理的紧密联系,已经成为近年来 Android Kernel 中一个比较有价值的攻击面,与 GPU 相关的 CVE 不算少,但是只有很少数漏洞被公开分析,安全公告中也不会谈及漏洞细节,因此每个版本的 patch 就成了分析漏洞的重要线索。

Dangling pointers, fragile memory — from an undisclosed vulnerability to Pixel 9 Pro privilege escalation

Article about analyzing and exploiting a race condition that leads to a double-free in the Arm Mali GPU driver.

dawnslab.jd.com/Pixel_9_Pro_...

3 months ago 2 0 0 0

The article also describes the nonsensical responses MediaTek gave to the bug reports, seemingly trying to weasel out of assigning a High impact rating to the reported bugs.

3 months ago 0 0 0 0
Advertisement
Preview
mediatek? more like media-REKT, amirite. A year-in-review going over 19+ bugs in Mediatek’s MT76xx/MT7915 (and others) wifi chipsets I reported this year, PoCs included!

mediatek? more like media-rekt, amirite.

Article by hypr covering an assortment of bugs the author found in the MediaTek MT76xx and MT7915 Wi-Fi drivers.

blog.coffinsec.com/0days/2025/1...

3 months ago 0 0 1 0
Post image

CVE-2025-68260: rust_binder: fix race condition on death_list

First CVE was registered for the new Binder kernel driver written in Rust. The vulnerability is a race condition caused by a list operation in an unsafe code block.

lore.kernel.org/linux-cve-an...

3 months ago 0 0 0 0
Preview
Singularity: Deep Dive into a Modern Stealth Linux Kernel Rootkit – Kyntra Blog Deep dive into a modern stealth Linux kernel rootkit with advanced evasion and persistence techniques

MatheuZSec published a detailed article about Singularity — a loadable kernel module rootkit developed for 6.x Linux kernels. The rootkit uses ftrace for hooking syscalls and hiding itself.

Article: blog.kyntra.io/Singularity-...
Code: github.com/MatheuZSecur...

4 months ago 1 0 0 0
Post image

Extending Kernel Race Windows Using '/dev/shm'

Article by Faith about extending race condition windows via FALLOC_FL_PUNCH_HOLE. The technique allows delaying user memory accesses from the kernel mode, similar to userfaultfd and FUSE.

faith2dxy.xyz/2025-11-28/e...

4 months ago 0 0 0 0
Preview
[CVE-2025-38001] Exploiting All Google kernelCTF Instances And Debian 12 With A 0-Day For $82k: An RBTree Family Drama (Part One: LTS & COS) CVE-2025-38001 is a Use-After-Free vulnerability in the Linux network packet scheduler, specifically in the HFSC queuing discipline. When the HFSC qdisc is utilized with NETEM and NETEM packet duplica...

The exploit was also covered in a previously posted article.

syst3mfailure.io/rbtree-famil...

4 months ago 0 0 0 0
HEXACON 2025 - An RbTree Family Drama by William Liu & Savino Dicanosa
HEXACON 2025 - An RbTree Family Drama by William Liu & Savino Dicanosa YouTube video by Hexacon

An RbTree Family Drama

Talk by William Liu and Savino Dicanosa @cor_ctf about exploiting CVE-2025-38001 — a use-after-free in the network packet scheduler.

Video: www.youtube.com/watch?v=C-52...
Slides: storage.googleapis.com/static.cor.t...

4 months ago 0 0 1 0
HEXACON 2025 - Déjà Vu in Linux io_uring by Pumpkin
HEXACON 2025 - Déjà Vu in Linux io_uring by Pumpkin YouTube video by Hexacon

Déjà Vu in Linux io_uring

Talk by Pumpkin about exploiting CVE-2025-21836 — a race condition that leads to a use-after-free in the io_uring subsystem.

Video: www.youtube.com/watch?v=Ry4e...
Slides: u1f383.github.io/slides/talks...

4 months ago 0 0 0 0