The presentation discusses a new technical method to turn seemingly low-risk kernel bugs into memory corruption vulnerabilities, and demonstrates how this approach can be used to escalate Linux kernel non-security bugs into exploitable vulnerabilities.
- Kernel fuzzing techniques have led to the discovery of over 2,000 kernel bug reports on Linux in the past two years
- Memory corruption is typically the prerequisite for exploiting the Linux kernel and obtaining unauthorized root privilege
- A new technical method is introduced to turn low-risk kernel bugs into memory corruption vulnerabilities
- The approach is demonstrated on a real-world kernel bug in Centaurus kernel, which was successfully turned into an exploitable vulnerability
- The presentation highlights the importance of checking for unfixed exploitable bugs in vendor's kernel, as many bugs don't have CVEs and their exploitability is unknown
- The speaker also provides his contact information and expresses interest in internship opportunities
The speaker demonstrates how a seemingly low-risk kernel bug in Centaurus kernel was turned into an exploitable vulnerability, with the ability to leak kernel data and hijack kernel control flow. This highlights the importance of thoroughly assessing a kernel bug's severity and exploitability, as seemingly low-risk bugs can have severe memory corruption abilities.