Breaking the Glass Sandbox: Find Linux Kernel Bugs and Escape
Linux kernel bugs are plentiful and also powerful. However, sandboxing limits the amount of kernel code that is reachable from within (like an Android app, for example).
This talk will cover how to discover these reachable code paths and find exploitable bugs in them. This same method can be used for defense - attack surface reduction and hardening! I'll discuss interesting bugs I've found this way and some neat tricks to reach more vulnerable code.
Why does this matter? Targeting exposed code paths yield more valuable bugs. It's also how attackers choose where to closely monitor commits for silent security fixes. For example, anyone can view syzbot bugs, but determining whether it is a usable bug and how to write a simple reproducer is another matter. Attendees of this talk will walk away knowing techniques to do both and how to identify kernel components that are ripe for exploitation.