Тёмный

new linux exploit is absolutely insane 

Low Level
Подписаться 694 тыс.
Просмотров 430 тыс.
50% 1

Опубликовано:

 

27 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 767   
@LowLevel-TV
@LowLevel-TV 6 месяцев назад
Thanks for watching guys! ( come learn C at lowlevel.academy 🥺)
@Daniel-vs7it
@Daniel-vs7it 6 месяцев назад
hi
@Alfred-Neuman
@Alfred-Neuman 6 месяцев назад
Ha! I always knew Linux was unsafe! That's why I'm still using Windows 98 and I only connect to the internet with my 56k modem...
@drpoundsign
@drpoundsign 6 месяцев назад
@@Alfred-Neuman LUV that toilet-flushing sound. I DO hope you are being Facetious and Sarcastic.
@real_yoplayer1
@real_yoplayer1 6 месяцев назад
​No, @@drpoundsign, Windows 98 is the newest version of Windows, safe and secure
@AnonymousAccount514
@AnonymousAccount514 6 месяцев назад
rewrite the linux kernel in Rust???
@Swampdragon102
@Swampdragon102 6 месяцев назад
The most shocking part of this video was that 2016 was 8 years ago.
@edwardmacnab354
@edwardmacnab354 6 месяцев назад
I missed the 2016 mentioned , where is it in the video ?
@NisheshTyagi
@NisheshTyagi 6 месяцев назад
@@edwardmacnab354 2:02
@maro0ozzz
@maro0ozzz 6 месяцев назад
@@edwardmacnab354 2:02
@ryadboufar4741
@ryadboufar4741 6 месяцев назад
sad reacts only
@jjm7797
@jjm7797 6 месяцев назад
@@edwardmacnab354 2:02, you didn't miss much!
@WansVids
@WansVids 6 месяцев назад
If you're wondering which kernel versions are vulnerable, here's what I found: The exploit affects kernel versions from (including) v5.14 to (including) v6.6, excluding patched branches v5.15.149>, v6.1.76>, v6.6.15>.
@Blaineworld
@Blaineworld 6 месяцев назад
i’m on 6.8.0 so that means i’m safe? right?
@WansVids
@WansVids 6 месяцев назад
@@BlaineworldYeah, you're fine. It's patched since 6.7.
@rayauxey
@rayauxey 6 месяцев назад
I'm surprised he didn't include this in the video
@guilherme5094
@guilherme5094 6 месяцев назад
o7!
@Tobsson
@Tobsson 6 месяцев назад
​@ap3ture0switch distro to fedora or arch. You'll always be up to speed.
@jimdiroffii
@jimdiroffii 6 месяцев назад
I just read this entire write up yesterday, and I was blown away with the thoroughness and complexity of the research. And, it was only found because the author found a bug while trying to do some work. Most people just find another way, this guy found a wild exploit. Very impressive. Cheers to notselwyn
@XerrolAvengerII
@XerrolAvengerII 6 месяцев назад
me, a plucky wizards apprentice resetting user passwords and setting up accounts, watching a RU-vid video about dark sorcerers unraveling death itself and warping space and time
@LowLevel-TV
@LowLevel-TV 6 месяцев назад
I love this analogy XD
@Dirtyharry70585
@Dirtyharry70585 5 месяцев назад
Simply about money and or destruction of property by people who have no morals, and could care less about who it affects or lives that can be lost
@slayeryt637
@slayeryt637 5 месяцев назад
@@Dirtyharry70585 there's so many more reasons to want to make exploits than just death and destruction. What about the pure beauty in the exploit itself?
@LBNODK
@LBNODK 5 месяцев назад
my name is my passport, then only i can be i as good as i... especialy in tron trades of wireless energetic multi androidic communication, were the cyberwar algorithm makes attack due ineffecientcy by having a password different then own name.... entering string linguistic and design of solid state reality... and so on and so forth.... = no pwd, then it is my own PersonalComputer communication fassett!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
@PS_Tube
@PS_Tube 6 месяцев назад
It was discovered in January, 2024. And has been patched already. All the rolling distributions would have the patch already installed. Ubuntu has already issued the patch back in Jan.
@rbgtk
@rbgtk 6 месяцев назад
Thanks!
@maxturgeon89
@maxturgeon89 6 месяцев назад
Thanks! That definitely should have been part of the video
@sunilpaul6891
@sunilpaul6891 6 месяцев назад
I got really worried because i run linux; thanks
@zeckma
@zeckma 6 месяцев назад
Thanks for informing us!
@TurtleKwitty
@TurtleKwitty 6 месяцев назад
@@sunilpaul6891 A professional researched bug like this is always patched before it becomes public like this, assume its fixed unless it's mentioned it's not
@demonman1234
@demonman1234 6 месяцев назад
We’re making it out of the userspace with this one boys
@pu239
@pu239 6 месяцев назад
Hi, this was a slightly unleveled video: It was basic in the beginning with you explaining what the kernel does and about syscalls, and then you explained the whole exploit in less time than that, which was too advanced. I know what the kernel is and that by interfacing with the kernel you are asking the kernel to do stuff. I also understand double-freeing and use after free, but socket buffer freelist/all those page descriptors/modprobe was explained in less than 2 minutes If you spent maybe 2 mins explaining the kernel and syscall basics part and 4-5 mins on the actual exploit, it would have more sense Thanks!
@adammontgomery7980
@adammontgomery7980 6 месяцев назад
Nah, this deserves an hour at least.
@a.lollipop
@a.lollipop 6 месяцев назад
i agree, i got very lost when he was explaining the actual exploit haha
@WasguckstdudieURlan
@WasguckstdudieURlan 6 месяцев назад
Maybe he did it by intention, it's quite new after all. However he linked the full article in the description (77 min read) that goes into full detail
@aaaAaAAaaaaAa1aAAAAaaaaAAAAaaa
@aaaAaAAaaaaAa1aAAAAaaaaAAAAaaa 6 месяцев назад
its mostly just data structure manipulation
@patrickstival6179
@patrickstival6179 6 месяцев назад
Yeah, I got that same feeling. I will ask chatgpt now about that stuff
@clintonreisig
@clintonreisig 6 месяцев назад
It was fixed almost immediately. That is a strong advantage of Open Source in contrast to big corp coverups
@GoogleDoesEvil
@GoogleDoesEvil 6 месяцев назад
If it was Windows, it would have been fixed before it was disclosed.
@kooostia16
@kooostia16 6 месяцев назад
@@GoogleDoesEvil it would be fixed after it was disclosed after several years
@YTDeletes90PercentOfMyComments
@YTDeletes90PercentOfMyComments 6 месяцев назад
@@kooostia16 it would then take 30 years for corporations to implement the fix
@dusxmt
@dusxmt 6 месяцев назад
A disadvantage is that a whole bunch of companies "just ship" open source solutions based off of Linux and barely provide any security updates, which are critically important. This is one of the reasons I don't like IoT, because it's extremely susceptible to issues like this.
@edwardmacnab354
@edwardmacnab354 6 месяцев назад
@@GoogleDoesEvil it would have been fixed ? by windows ? , tell me you don't know the history of windows by not telling me --lol
@incogninto1124
@incogninto1124 6 месяцев назад
Time to finally root the Oculus Quest 2
@hyperkiko
@hyperkiko 6 месяцев назад
it has already been done anyways
@incogninto1124
@incogninto1124 6 месяцев назад
@@hyperkiko Why not do it again?
@hyperkiko
@hyperkiko 6 месяцев назад
@@incogninto1124 i will actually try it on my quest 3, i checked the kernel for the quest 3 and it isnt patched on it
@wheeI
@wheeI 6 месяцев назад
looking for a poc right now
@hyperkiko
@hyperkiko 6 месяцев назад
@@wheeI the github link in the description
@kayakMike1000
@kayakMike1000 6 месяцев назад
Running in kernel is worse than running as root.
@dahahaka
@dahahaka 6 месяцев назад
from my understanding they're not really running or changing that much code inside the kernel, that might be pretty complicated, but they're letting the kernel execute their binary as root by changing a path, that's still not running inside the kernel
@rusi6219
@rusi6219 6 месяцев назад
Everything should run in kernel This comment was posted by TempleOS Gang
@kayakMike1000
@kayakMike1000 6 месяцев назад
@@dahahaka well, depends. Running inside the kernel could cause a kernel panic and crash the whole system, running as root just causes a segfault
@dahahaka
@dahahaka 6 месяцев назад
@@rusi6219 niche and I love it
@averagegeek3957
@averagegeek3957 6 месяцев назад
@@rusi6219 RIP Terry
@RobertHyrkiel
@RobertHyrkiel 6 месяцев назад
I'm learning that the safest way to store your secure data is on a piece of paper
@Gogeta70
@Gogeta70 6 месяцев назад
Yep, no better method than writing your password on a sticky note and "hiding" it under your keyboard... lol
@YeeLeeHaw
@YeeLeeHaw 6 месяцев назад
Only second to your brain, but sometimes the files can get corrupted up there or with package loss before reaching your fingers.
@Sypaka
@Sypaka 6 месяцев назад
And all it takes, is a pencil to make a copy of everything you wrote.
@oxylepy2
@oxylepy2 6 месяцев назад
@@Sypaka assuming the location of the written information is known. Sure it isn't going to stop your kids from finding it, or Boeing, but it works against the hackers online
@someoneelse5005
@someoneelse5005 6 месяцев назад
@@Sypakaor a photo but you keep forgetting the whole part of physically being there
@thedtubeteam7981
@thedtubeteam7981 6 месяцев назад
Welp, time to upgrade my kernel.
@kolz4ever1980
@kolz4ever1980 6 месяцев назад
you think? Might be why distros push out updates..
@ent2220
@ent2220 6 месяцев назад
Tell me about it. I'm still on Fedora 37 with kernel 5.15 LTS, which I haven't updated in about 6 months because the updates stopped lmao. I might have to jump to the newest Fedora 40 beta.Luckily 99% of my apps are flatpaked, installed with the --user flag, and I have dconf commands to apply all my GNOME settings. So I would barely have to re-setup anything and will have all my apps and userdata once I upgrade.
@robertjenkins6132
@robertjenkins6132 6 месяцев назад
What's the big deal? As I understand, malicious code running in userland could take advantage of the exploit to run arbitrary code as root? But why would you run malicious code on your computer??? My personal policy is that I don't run anything that I'm not getting from a trusted source. You have javascript on web pages but that runs in its own sandbox in the browser (on Windows as well), and if you have AdBlock installed then that blocks a lot of crud right there. The Internet is more centralized nowadays so most people spend their time on a few websites run by giant corporations. Presumably your personal network is protected with a wifi password and firewall. I mean, if you're a network admin and people can come in and run any kind of code on your network's computers, then maybe that's where it would be warranted to be a bit concerned about such a privilege escalation vulnerability. In olden days everything ran as root in Windows 3.1 (or the Windows analogue of "root"), but you would not become infected if you did not click on malicious .exe files (also best to avoid Internet Explorer and ActiveX). I think that if there is malicious code, which might be inclined to _attempt_ a privlege escalation exploit, running on your machine, then you're already in a bad place. In my opinion, it's not good to have malicious code running, even if it is not escalated up to root...
@hawkbirdtree3660
@hawkbirdtree3660 6 месяцев назад
Bugs never went away, but recently, it feels like bugs just did 20 years in prison, and they've been released on parole.
@Catalyst8487
@Catalyst8487 6 месяцев назад
Really enjoyed this kind of video from you! Admittedly, some of the exploit explanation went over my head and I'll need to do some further research on my end. You might have yourself a little niche here of in-depth explanations of vulnerabilities in an ELI5 manner if you want it. I'd love to see more videos like this with other well-known or new vulnerabilities.
@oscarmendez9079
@oscarmendez9079 6 месяцев назад
Relatively new here - background is in mechanical engineering but I would really like to learn embedded software development ( for myself and for my job). Really enjoy these types of videos. I will say I always write some of the acronyms from these videos down on stickies to look up later, given my lack of knowledge of the inner workings of computers. TIL what a TLB is. Anyways, looking forward to any and all videos 👍🏼
@edk3539
@edk3539 6 месяцев назад
translate look-aside buffer. i learned it in early ee/cs course on cpu's
@arthurmoore9488
@arthurmoore9488 6 месяцев назад
Analogy, you know how you can have a reference book which has a chapter list at the front, then every chapter has a section list at the start. That's how these work. Another common trick is to say: * Chapter 1 - Pages 100-199 * Chapter 2 - Pages 200-299 etc... Sure there may be some blank pages, but the hardware can be designed to be really really fast.
@IngwiePhoenix
@IngwiePhoenix 6 месяцев назад
I am looking at the proprietary Linux devices at home and at work and just... curiously tapping my chin. This ought to be interesting (:
@BenjaminVestergaard
@BenjaminVestergaard 6 месяцев назад
The poor guy that was tasked to educate me about Linux wasn't allowed to use an updated Linux for education... he had to stick to one (old) version of RedHat, because that's what the book used... It took me 1 Google, 3 potential exploits and 15 minutes to become root of that educational Linux server. (Okay, I was familiar with Linux before they tried to educate me). I just made an extra root account, which was allowed to login via ssh. Could have locked out everyone else... but I was just making a point about using outdated software for education. Netfilter is quite a problem if it can elevate privileges. But at the same time kinda predictable... I'm happy that it's been found, so next iteration will be safer. Worst is how easy it can be used.
@SanchoPanza-m8m
@SanchoPanza-m8m 6 месяцев назад
Excellent whitehat hacking.
@sayori3939
@sayori3939 Месяц назад
I'll do the same :3 already found the vulnerability
@BenjaminVestergaard
@BenjaminVestergaard Месяц назад
Even white hats are being cursed at in corporate setups. A lot of organisations still rely on security by obscurity and doesn't do the mental exercise of "how would I get in if I lost my key"... If you do that well enough, you can't... if it was a physical building of yours you'd probably find the least expensive window to break and pay for that. If you're clever you piggyback on some software that needs root. In that way, it's very difficult to lock out the legitimate admin. Problem is, an experienced hacker would probably also have installed a few back-doors upon arrival. Edit: having physical access to your server is the ultimate security... but so much is virtual today.
@enigmatico6209
@enigmatico6209 6 месяцев назад
Yeah all Linux distributions probably has this patched, but think about all the routers and phones and devices like smart TVs and everything that are connected to the internet and are probably still outdated, like your router if you have an ISP that doesn't allow you to switch it. A lot of these run on Linux and are likely using an outdated version of the kernel.
@techwolflupindo
@techwolflupindo 6 месяцев назад
And to think, one can now hack it to put there own updated software that the manufacture locks you out of so you can't update.
@SanchoPanza-m8m
@SanchoPanza-m8m 6 месяцев назад
@@techwolflupindoTheir?
@dustsheep1316
@dustsheep1316 6 месяцев назад
I love how you keep it short all the time, I don't want to watch through 40 minutes of detailed explanation. This is the perfect overview - thank you very much
@DeusGladiorum
@DeusGladiorum 6 месяцев назад
You should do a video on the most impactful or crazy bugs of all time, or perhaps per decade/computing era
@ACium.
@ACium. 6 месяцев назад
Nice one
@UltimatePerfection
@UltimatePerfection 6 месяцев назад
Can you talk about the backdoor in liblzma/xz that lets you avoid SSH?
@softwarelivre2389
@softwarelivre2389 6 месяцев назад
He just did! The man is really quick
@claudiu7909
@claudiu7909 6 месяцев назад
Hmmm, what I hear is: NEW android rooting method (possibly) if someone implements this functionality into a su/sudo, someone else might be able to port it on android and we'll have a new way of rooting some of the older phones that either didn't have a way to be rooted or didn't have a big enough user base for someone to find a way to root them. ofc this is only possible if the same exploit is available in the android kernel.
@AWIRE_onpc
@AWIRE_onpc 6 месяцев назад
Right after i installed debian...
@vaisakhkm783
@vaisakhkm783 6 месяцев назад
XD good luck for next 10 years...
@yramagicman675
@yramagicman675 6 месяцев назад
@@vaisakhkm783 eh, if I'm not trying yo completely kill the joke it's more like 3 months. Debian does apply security patches pretty effectively. To kill the joke completely, in reality, the bug is probably patched in latest and LTS kernels by now, it's just up to the distributions at this point, and Debian uses a patched version of the LTS kernel
@Excalibur13
@Excalibur13 6 месяцев назад
rm -rf install gentoo
@Jeppelelle
@Jeppelelle 6 месяцев назад
So? Just update the kernel like you would on any other distro
@willardorwud
@willardorwud 6 месяцев назад
@@Excalibur13 rm -rf --no-preserve-root
@sumless
@sumless 4 месяца назад
One thing many folks might not understand is that the attacker needs to have access to the system to exploit/gain this privilege. That being said, it can be used in a process where user xyz is harmlessly (or intentionally) installing something onto the box itself. This doesn't mean that any Linux system sitting idly on a network can be exploited from a pure network means. One of the overcites most folks make is hearing there is an exploit that gains root access means you need to drop everything and patch any and every system running Linux distro version xyz as the exploit affects them immediately. It really depends on the system, it's use, it's broad access, and several other factors. Granted, this is not to say you should not address such a situation, but by all means it doesn't mean the sky is falling either. All the same, very interesting how this one works, and thank you for breaking it down the way you have.
@ryangrogan6839
@ryangrogan6839 6 месяцев назад
Soooo, what is vulnerable to this? Is this something that can happen if you have a socket based connection? Do you need access before escalating? Itd be nice to know how to protect myself and not just how they do it.
@nou712
@nou712 6 месяцев назад
This windows users priorities are not to inform linux users like yourself. It is a local privesc so unless someone accesses your system you're fine. If you install buggy software from GNOME and their diverse programmers you open up more privesc possibilities.
@Pharoah2
@Pharoah2 6 месяцев назад
It has been patched for months so unless you’ve manually disabled security updates you are not vulnerable
@Pharoah2
@Pharoah2 6 месяцев назад
@@lawrencemanning not your fault. I have no idea why he didn’t mention it in the video.
@anthonybernstein1626
@anthonybernstein1626 6 месяцев назад
@@lawrencemanningProcess namespaces are enabled by default on most distros. A quick way to check is cat /proc/self/uid_map. If it exists, you have user NS.
@itskarudo
@itskarudo 6 месяцев назад
you should definitely do more detailed exploit writeup videos! :)
@epolpier
@epolpier 6 месяцев назад
He acknowledges himself that this is sth beyond his knowledge so better not try it...
@vasiliigulevich9202
@vasiliigulevich9202 6 месяцев назад
Exploit explanation starts at 3:47
@eliotmansfield
@eliotmansfield 5 месяцев назад
as someone who spent his teenage years in the 80’s aligning floppy disks who also had an engineering background - I always found that disks would run far more concentrically if you lowered the disk clamp slowly to give the cone a chance to clamp the disk correctly
@mihai6977
@mihai6977 6 месяцев назад
dude i'm high on shrooms rn this is insane.
@anonymouseovermouse1960
@anonymouseovermouse1960 6 месяцев назад
Highly based
@mihai6977
@mihai6977 6 месяцев назад
;p
@WreeperXD
@WreeperXD 6 месяцев назад
asa e frate
@johnkallimanis1599
@johnkallimanis1599 6 месяцев назад
I run the CVE testing code from the github account on a very recent (and patched) kernel and it froze and crashed the system. Very interesting
@4.0.4
@4.0.4 6 месяцев назад
I love how the author made such a cool graphic instead of just writing about it. It's clearly a lot of steps.
@Ch40zz
@Ch40zz 6 месяцев назад
many of these techniques are used for windows kernel exploitation quite often
@ent2220
@ent2220 6 месяцев назад
Yeah except they don't tell you about it and keep them open on purpose for the NSA, CIA etc. I'm also fairly confident that Bitlocker has a bunch of backdoors as well.
@rusi6219
@rusi6219 6 месяцев назад
@@ent2220 yeah why use that garbage when veracrypt is available
@kidnamedfinger.productions
@kidnamedfinger.productions 6 месяцев назад
@@ent2220 Some guy made a video on RU-vid how he cracks bitlocker in 50 seconds. Bitlocker is an absolute garbage.
@spambot7110
@spambot7110 6 месяцев назад
0:23 i think the "author of this bug" was probably not using novel techniques, i think they just made a mistake writing some kernel code
@tremon3688
@tremon3688 6 месяцев назад
He means the one who discovered the bug
@David-XCsoaring
@David-XCsoaring 5 месяцев назад
This video was fascinating to listen to as a Linux fan but if I am honest, I have no idea what he is talking about. This is on another level way over my head.
@researcher_x
@researcher_x 6 месяцев назад
Thanks for sharing your enthusiasm on this exploit. Next time, please try digging into it.
@downwardtumble4451
@downwardtumble4451 6 месяцев назад
“Dirty Cow” sounds like it would be a drink in Wisconsin lmao
@michasmarzewski3670
@michasmarzewski3670 4 месяца назад
It's impossible to catch exploit like this in closed source software. Libarchive that was modified by the author of the Linux backdoor is actively used in Windows for more than a year. We know this thanks to Linux being Open Source.
@elzabethtatcher9570
@elzabethtatcher9570 6 месяцев назад
I didn't understand a thing after the graph went up, but I hope kernel patches it soon! Did kernel devs found about this exploit "from the news", or maybe they were given a head start into fixing it?
@absurdengineering
@absurdengineering 6 месяцев назад
Micro kernel folks are having many last laughs lol. This is the sort of a thing that would let you snoop on network and nothing else on say Minix. In monolithic kernels, once you’re in, you’re really in.
@Z3rgatul
@Z3rgatul 6 месяцев назад
So, who was affected by this? Any system? Or just very specific network configuration?
@CFSworks
@CFSworks 6 месяцев назад
Looks like any unpatched Linux system newer than 3.15 (!!) with USERNS enabled. So... the vast majority of them. A mitigation is to set the sysctl kernel.unprivileged_userns_clone=0
@sayori3939
@sayori3939 Месяц назад
yeah and people pretend this is some ancient exploit that's not relevant like dirty cow, my school literally has this exploit
@RajarshiKhatua100
@RajarshiKhatua100 6 месяцев назад
windows/macos also have all kinds of bugs but no one knows because the source is not available
@edwardmacnab354
@edwardmacnab354 6 месяцев назад
and so is harder to write attacks ?
@BlueEyedVibeChecker
@BlueEyedVibeChecker 6 месяцев назад
Mac has less exploits than Linux and Windows combined. I'm a dualbooter for Win11Pro and Linux Mint and can confirm. Sounds like you're projecting more than anything. "Bu-but, Windows and Mac also do-" That's cool, but is there a bug to exploit who asked?
@Youtubed-jv5oi
@Youtubed-jv5oi 6 месяцев назад
@@BlueEyedVibeChecker I mean they're not wrong but the point is that Linux is backed by so many companies like Google, Microsoft, Oracle, Intel, AMD, etc so bugs are fixed extremely fast. The mac kernel is also open source. Windows lags behind
@robertthomas5906
@robertthomas5906 6 месяцев назад
@@BlueEyedVibeChecker Mac has more exploits than Linux. It's based off of BSD. Back in 2007 they proved the point by porting all the old Linux exploits over to BSD. Now it's not even maintained as well as it was back then. BSD also isn't a mandatory access control kernel. So it's at least 20 years out of date. Don't be fooled, you're not as secure.
@joelimbergamo639
@joelimbergamo639 6 месяцев назад
​@@BlueEyedVibeCheckerthe fact the nobody tries to find exploits there doesnt mean they dont exist.
@tank_man98
@tank_man98 6 месяцев назад
3:38 for a novice it would have been interesting if you would have elaborated on that matter a bit more. why does pulling certain levers result in a exploit?^^
@CFSworks
@CFSworks 6 месяцев назад
I think what he's trying to say is that the "only" userspace->kernel interface is syscalls. "Open this file." "Read me 32 bytes from the file." "Now I want to send those bytes to another process running on the same system." In theory, the syscalls are *individually* tested incredibly thoroughly (thanks to tools like Google's Syzkaller project and the tireless efforts of a few heroes in the Linux community) to the point that I'm 99.9999% sure there are no single-syscall bugs in Linux... But a *collection* of them issued in just the right order can make the kernel take a series of steps that leads it into a pitfall, even if each step it took along the way would, in a vacuum, be considered "fine."
@misterrreco2535
@misterrreco2535 6 месяцев назад
I'm proud I was able to understand half of this after my OS college classes
@keithmanning6564
@keithmanning6564 6 месяцев назад
Privilege escalations do not necessarily exploit kernel code, they could exploit weak applications which have higher privilege themselves
@Isaac-ph7sc
@Isaac-ph7sc 6 месяцев назад
Now I wonder if this can be used to root Android...
@kenny-ze8eg
@kenny-ze8eg 6 месяцев назад
So, this information only makes my situation way more puzzling to me. My respect for you guys is beyond comprehensive. I just wish I could cling onto the information and actually put it into play to fix my situation.
@chrissimpson1183
@chrissimpson1183 6 месяцев назад
So could the same thing be done on Mac OS since it is based on UNIX like LINUX is?
@raelimec
@raelimec 6 месяцев назад
I dont understand almost any of these but still catches my genuine interest, congrats bro!!
@scootergirl3662
@scootergirl3662 6 месяцев назад
LLC has a knack for explaining complicated low level processes in a way noobs can understand, without boring the people that do actually know a bit more. Rare skill.
@disieh
@disieh 6 месяцев назад
I get freelist is probably the prime example where to use linked lists over other alternatives, but for sake of argument assume freelist would have been a plain array (or vector). Would that have prevented the abuse from double free? (Yes I know fixing the double-free is the first priority)
@TalsBadKidney
@TalsBadKidney 6 месяцев назад
okay the GH says this blows right through defaults on debian-core systems... does this work on more serious SELinux like RHEL or Gentoo?
@avi8aviate
@avi8aviate 6 месяцев назад
There are multiple cases in Windows where the OS or one of the drivers calls a BugCheck the moment something tries to free the same section of memory twice, or tries to write to a freed section of memory. In other words, when this is detected, the system instantly shuts down and bluescreens.
@_JohnHammond
@_JohnHammond 6 месяцев назад
holy poop dude this video is popping off get that root shell 🔥🚀🐚🐚
@iamgeok
@iamgeok 6 месяцев назад
This is one of those channels I go to watch to feel smart. Knowing a little bit about computers, I understood everything and nothing 🤣
@shiftingsandsgames
@shiftingsandsgames 6 месяцев назад
Programming vulkan graphics lets me at least not get confused when i hear about buffers and descriptors😅
@alexlefevre3555
@alexlefevre3555 6 месяцев назад
That visual aid chart is very Charlie from It's Always Sunny-esque.
@BacklTrack
@BacklTrack 6 месяцев назад
I usually kinda understand a lot of general exploit stuff but this is just insane
@user-pd5ot4zd4b
@user-pd5ot4zd4b 6 месяцев назад
Sweet 'sploit, scary 'sploit. It must have been there for a long time and I wonder what other well resourced adversaries were sitting on it in a zeroday portfolio. Appears to require a local user, but also seems to be the kind of thing that might be projected through a web service bug into a RCE.
@deanvangreunen6457
@deanvangreunen6457 6 месяцев назад
Machines run on smoke and magic. All modern computers are just so scientifically advanced you could call it magic, we've taken rock (metal) and sand (silicone) and made it "think" 🎉😂😅
@mqnc6275
@mqnc6275 6 месяцев назад
I feel the audio in your videos comes ever so slightly before the visuals, totally drives my brain nuts
@Daroqe
@Daroqe 6 месяцев назад
yup makes my brain think hes an imposter alien
@ent2220
@ent2220 6 месяцев назад
Didn't even notice it. It's about the quality of the content (like the entertainment value it provides). I can care less about technical stuff like if the sound is off, or the quality is 360p, I can care less.
@isbestlizard
@isbestlizard 6 месяцев назад
I would love a hardened kernel that, many times per second, sanity checks EVERY KERNEL DATA STRUCTURE and panics if there's anything unexpected
@tablettablete186
@tablettablete186 6 месяцев назад
Window's HVCI in a nuttshell lol Btw, MS is also working to bring it to Linux.
@wernerviehhauser94
@wernerviehhauser94 6 месяцев назад
It would most likely be WinDOZE-like slow or boot into a kernel panic every time. A more sensible approach would be a change of mind among the kernel programmers to be more careful, but I don't like to be told this when hacking up something and so won't they. And that's even though I know I could bite my a** every time I break something by not being careful in the first place....
@JuliaYamYam
@JuliaYamYam 6 месяцев назад
Yea, ms patchguard, isnt hvcl a hypervisor based security feature, i guess its better because you dont need to periodically check structs, you can just catch writes and reads, and block them too!
@stunnerr
@stunnerr 6 месяцев назад
i don't think you have enough cpu for that
@tablettablete186
@tablettablete186 6 месяцев назад
@@stunnerr Many Win11 machines run with a similar setting enabled by default now (core isolation in the settings). I think newer machines can do it just fine.
@anthonywalker6268
@anthonywalker6268 6 месяцев назад
Daily reminder: there is no such thing as perfection.
@defnlife1683
@defnlife1683 5 месяцев назад
Woah the levels this went through. Sometimes I think some of these guys probably put this forward as advertisement for selling exploits or getting hired to develop them lmao.
@bingusbongus1656
@bingusbongus1656 6 месяцев назад
One of the reasons I love Linux compared to Windows at this point is how bugs and vulnerabilities are discovered and managed. On Windows, things like these are only discovered when Malware is taking advantage of it, take Wannacry as a perfect example. Nobody knew what EternalBlue was until after the damage was done. On Linux however, a bug like that making something like that possible will be discovered by the Kernel devs themselves and nothing malicious will be able to take advantage of it.
@davidyanceyjr
@davidyanceyjr 5 месяцев назад
So how do you double free the kernel without being root? Or another privelaged user?
@sativagirl1885
@sativagirl1885 6 месяцев назад
The current version of the linux kernel is Finnish, barely legal and entitled to human rights pursuant to EU regulations.
@TunifyBasic
@TunifyBasic 6 месяцев назад
netfilter is a good attack surface even in wiki leaks you will find some old exploits on linux that uses the netfilter
@profiluefter
@profiluefter 5 месяцев назад
very cool video but btw your video is out of sync with the audio track. once you notice it you can't unsee it ^^
@aidanfisher97
@aidanfisher97 6 месяцев назад
Well, on the bright side, that can be fixed by the developer or the community due to its open source nature.
@orhansenglish
@orhansenglish 6 месяцев назад
i use arch btw
@wickeddubz
@wickeddubz 6 месяцев назад
Level of discussions on this channel regularly makes my brain hurt in positive sense, but i can’t imagine level of those dudes who actually found this bug and used it. It’s WTF++ or even higher
@AadidevSooknananNXS
@AadidevSooknananNXS 6 месяцев назад
Hey @LowLevelLearning, how do you decide what to learn?
@pixelgameing
@pixelgameing 6 месяцев назад
Is it possible to use this exploit to get root access on a Android device?
@i_am_aladeen
@i_am_aladeen 4 месяца назад
Fun fact: Such an exploit exists in Windows to this date. And it requires no advanced skills to use. I discovered it with Basic 😂
@AdminOfYourMom
@AdminOfYourMom 6 месяцев назад
That's exactly the reason why I'm still rocking on the granddaddy 1.1.0 Linux kernel from '97. These Gen-alpha skibidi toilet vulns be like, "Ew, we only swipe right on the TikTok kernels." They don't even peep this golden oldie. USB drivers, more like USB driers, Bluetooth? more like Blue-toothless. My network's as untouched as a sealed vintage comic book, NSA/FBI/Mossad can't even. Just me, my unshakeable, mouse-less xorg, my dial-up connection, and my CASIO watch. Hackers peep that setup and they're like, "Nah, we ain't touching that with a ten-foot pole." ROFLCOPTER
@BillAnt
@BillAnt 6 месяцев назад
DoubleFree to SideChannel attack.... "Hold my beer!" lol
@do0nv
@do0nv 6 месяцев назад
wtf did i just read
@user_of_the_name
@user_of_the_name 6 месяцев назад
new copypasta just dropped
@AdminOfYourMom
@AdminOfYourMom 6 месяцев назад
@@user_of_the_name holy hell!
@sandrin0
@sandrin0 6 месяцев назад
SOI SOI SOI SOI
@pacifico4999
@pacifico4999 6 месяцев назад
Sounds a little similar to Asahi Lina's MacOS exploit, that also messed with page tables. At least that second half of the exploit
@rlifts
@rlifts 6 месяцев назад
Requires musl-gcc does this mean it's linked against musl lib? If so it wouldn't work on the majority of Linux systems that use glibc.
@kimberlyjacobsen4148
@kimberlyjacobsen4148 6 месяцев назад
FYI: he Said for instance Ubuntu 0:57 . The exploid is not found in Ubuntu
@Liberty4Ever
@Liberty4Ever 6 месяцев назад
Kernel patch in 3... 2... 1....
@sayori3939
@sayori3939 Месяц назад
now wait another 10 years until most machines are upgraded/patched
@Rasspor
@Rasspor 6 месяцев назад
Some people work really hard to find these exploits. Way over achieving. AMAZING!!!!
@medbenbrahim3246
@medbenbrahim3246 6 месяцев назад
I bet you this won't happen if kernel is written in javascript Jokes aside, would be interesting to read the buggy code, and learn why a double free wasn't detected for decades by dynamic/static analysis.
@uiopuiop3472
@uiopuiop3472 6 месяцев назад
for normal computers that aren't servers it shouldn't be that big of a problem. if you install random malware on your computer you have bigger problems to worry about than it exploiting your system
@Ultrajamz
@Ultrajamz 5 месяцев назад
Wonder how many more we’ve got. *glows*
@svarodzic
@svarodzic 6 месяцев назад
Yes, I definitely learned something here. That I am stupid as a rock! ))) Even though I've been doing system programming for 30 years now.
@seand7603
@seand7603 6 месяцев назад
Patched in Feb. Cool overview.
@mb00001
@mb00001 6 месяцев назад
usually i can follow along, but this is very complicated, it makes me wonder if things in the world of exploitation are about to get much more in depth and crazy
@esra_erimez
@esra_erimez 6 месяцев назад
So, you need to install the software on the computer first? I suspect this is a problem in cloud environments.
@michalpbielawski
@michalpbielawski 6 месяцев назад
C Skill Issue confirmed! The White House was right - we need to rewrite everything in Rust!
@dck8740
@dck8740 6 месяцев назад
What is the best way to learn Win32 API and Windows exploitation?
@gingeral253
@gingeral253 6 месяцев назад
Wow… bugs are everywhere huh
@davidgillies620
@davidgillies620 6 месяцев назад
Is there a mitigation yet?
@volkwell-wk3eq
@volkwell-wk3eq 6 месяцев назад
its the same bug from 3 years ago. Linus... Also, free does not work but when it works it gives you root access! The linux kernel truly is the kernel of all time.
@AllForMarketing
@AllForMarketing 6 месяцев назад
modprobe? You should sign the module if you are using secure boot, right? Does the exploit work with secure boot? kinda tired to look for my self r8 now :)
@ChrisWijtmans
@ChrisWijtmans 6 месяцев назад
I dont even use modules. Run a custom kernel with whatever i need enabled or disabled.
@Faeest
@Faeest 6 месяцев назад
me casually eating a bomb instead of meal my mom give me cause it look the same
@kenny-ze8eg
@kenny-ze8eg 6 месяцев назад
Hmm. So would something like this happen if someone accidently ran a Linux tool as root on windows because a confusion with cross compatability. Thinking it would run the windows prompt, honestly. Idk why i thought that. I didn't know a thing then. But I was trying to save all my shit after calling and getting scammed. It's been. A very unfortunate and mind puzzling situation
@techmouse.
@techmouse. 6 месяцев назад
oo-boon-too Not you-bun-too.
@shizeeque
@shizeeque 6 месяцев назад
who cares, mate? People call `zsh` "zee-es-eitch" instead of the official "zee-shell" all the time.
@techmouse.
@techmouse. 6 месяцев назад
@@shizeeque You're watching a youtube video about Linux kernel exploits. This is an _incredibly_ niche topic. This isn't walmart, starbucks, or a movie theater. You have to be a very specific kind of person to end up here. Normies don't come here. So who would care? Presumably _everybody_ here.
@incognit01233
@incognit01233 5 месяцев назад
Lol "new" Alphabets have had a backdoor since forever
@guyblack9729
@guyblack9729 6 месяцев назад
So you're saying now I can run system updates without typing my password?
@robertlawson4295
@robertlawson4295 6 месяцев назад
More and more complexity leads to exponentially more vulnerability ... simplifying does the opposite. Simple is robust, complex is fragile because there are more things to go wrong. 🤔
@Heater-v1.0.0
@Heater-v1.0.0 6 месяцев назад
That is somewhat true. However, if processors and kernels were made dead simple, like they were in 16 bit x86, MSDOS days, people would complain like hell that their computers are so slow. And the security provisions would be totally gone. As they were in 16 bit x86, MSDOS days.
@HikaruAkitsuki
@HikaruAkitsuki 6 месяцев назад
Glad that most of the Linux are bleeding edge. But updating millions of Linux server for web hosting and other purposes is nightmare.
Далее
we need to talk about the new Linux exploit (9.9 CVSS)
13:50
What Everyone Missed About The Linux Hack
20:24
Просмотров 286 тыс.
"Когти льва" Анатолий МАЛЕЦ
53:01
We finally APPROVED @ZachChoi
00:31
Просмотров 7 млн
this SSH exploit is absolutely wild
11:59
Просмотров 335 тыс.
researchers find an unfixable bug in EVERY ARM cpu
9:48
Why Linux is better for (most) developers!
14:59
Просмотров 476 тыс.
How A Steam Bug Deleted Someone’s Entire PC
11:49
Просмотров 999 тыс.
the new PS4 jailbreak is sort of hilarious
12:21
Просмотров 795 тыс.
Harder Drive: Hard drives we didn't want or need
36:47
why are switch statements so HECKIN fast?
11:03
Просмотров 410 тыс.
malicious javascript injected into 100,000 websites
12:28
one of the craziest exploits i've ever seen
8:40
Просмотров 382 тыс.