3eeee01f06
10th module. Ubuntu-specific userns + overlayfs LPE that injects file
capabilities cross-namespace.
- modules/overlayfs_cve_2021_3493/iamroot_modules.{c,h}:
- is_ubuntu() — parses /etc/os-release for ID=ubuntu or
ID_LIKE=ubuntu. Non-Ubuntu hosts get IAMROOT_OK immediately (the
bug is specific to Ubuntu's modified overlayfs).
- unprivileged_userns_clone gate — sysctl=0 → PRECOND_FAIL
- Active probe (--active): forks a child that enters userns +
mountns and attempts the overlayfs mount inside /tmp. Mount
success on Ubuntu = VULNERABLE. Mount denied = patched / AppArmor
block. Child-isolated so parent's namespace state is untouched.
- Version fallback: kernel < 5.13 = vulnerable-by-inference for
Ubuntu kernels; recommend --active for confirmation.
- Exploit: detect-only stub. Reference vsh's exploit-cve-2021-3493
for full version (mount overlayfs in userns, drop binary with
cap_setuid+ep into upper layer, re-exec outside ns).
- Embedded auditd rules: mount(overlay) syscall + security.capability
xattr writes (the exploit's two-step footprint).
Verified end-to-end on kctf-mgr (Debian):
iamroot --scan → 'not Ubuntu — bug is Ubuntu-specific' → IAMROOT_OK
Module count: 10. Active-probe pattern now applies to dirty_pipe,
entrybleed, and overlayfs (and copy_fail_family via existing
dirtyfail_active_probes global). Detect quality across the corpus
materially improved this session.
94 lines
3.1 KiB
Makefile
94 lines
3.1 KiB
Makefile
# IAMROOT — top-level Makefile (Phase 1)
|
|
#
|
|
# Builds one binary `iamroot` linked from:
|
|
# - core/ module interface + registry
|
|
# - modules/<f>/ one family per subdir, contributes objects to the
|
|
# final binary
|
|
# - iamroot.c top-level dispatcher
|
|
#
|
|
# Each family is currently flat (Phase 1 keeps copy_fail_family's
|
|
# absorbed DIRTYFAIL source in modules/copy_fail_family/src/).
|
|
# Future families register the same way: add their register_* call to
|
|
# iamroot.c's main() and add their src dir to MODULE_DIRS below.
|
|
|
|
CC ?= gcc
|
|
CFLAGS ?= -O2 -Wall -Wextra -Wno-unused-parameter -Wno-pointer-arith \
|
|
-D_GNU_SOURCE -D_FILE_OFFSET_BITS=64
|
|
LDFLAGS ?=
|
|
|
|
BUILD := build
|
|
BIN := iamroot
|
|
|
|
# core/
|
|
CORE_SRCS := core/registry.c core/kernel_range.c
|
|
CORE_OBJS := $(patsubst %.c,$(BUILD)/%.o,$(CORE_SRCS))
|
|
|
|
# Family: copy_fail_family
|
|
# All DIRTYFAIL .c files contribute; iamroot_modules.c is the bridge.
|
|
CFF_DIR := modules/copy_fail_family
|
|
CFF_SRCS := $(wildcard $(CFF_DIR)/src/*.c) $(CFF_DIR)/iamroot_modules.c
|
|
# Filter out the original dirtyfail.c (its main() conflicts with iamroot.c's main).
|
|
CFF_SRCS := $(filter-out $(CFF_DIR)/src/dirtyfail.c, $(CFF_SRCS))
|
|
CFF_OBJS := $(patsubst %.c,$(BUILD)/%.o,$(CFF_SRCS))
|
|
|
|
# Family: dirty_pipe (single-CVE family, no shared infrastructure)
|
|
DP_DIR := modules/dirty_pipe_cve_2022_0847
|
|
DP_SRCS := $(DP_DIR)/iamroot_modules.c
|
|
DP_OBJS := $(patsubst %.c,$(BUILD)/%.o,$(DP_SRCS))
|
|
|
|
# Family: entrybleed (single-CVE family, x86_64 only)
|
|
EB_DIR := modules/entrybleed_cve_2023_0458
|
|
EB_SRCS := $(EB_DIR)/iamroot_modules.c
|
|
EB_OBJS := $(patsubst %.c,$(BUILD)/%.o,$(EB_SRCS))
|
|
|
|
# Family: pwnkit (userspace polkit bug, not kernel)
|
|
PK_DIR := modules/pwnkit_cve_2021_4034
|
|
PK_SRCS := $(PK_DIR)/iamroot_modules.c
|
|
PK_OBJS := $(patsubst %.c,$(BUILD)/%.o,$(PK_SRCS))
|
|
|
|
# Family: nf_tables (CVE-2024-1086)
|
|
NFT_DIR := modules/nf_tables_cve_2024_1086
|
|
NFT_SRCS := $(NFT_DIR)/iamroot_modules.c
|
|
NFT_OBJS := $(patsubst %.c,$(BUILD)/%.o,$(NFT_SRCS))
|
|
|
|
# Family: overlayfs (CVE-2021-3493)
|
|
OVL_DIR := modules/overlayfs_cve_2021_3493
|
|
OVL_SRCS := $(OVL_DIR)/iamroot_modules.c
|
|
OVL_OBJS := $(patsubst %.c,$(BUILD)/%.o,$(OVL_SRCS))
|
|
|
|
# Top-level dispatcher
|
|
TOP_OBJ := $(BUILD)/iamroot.o
|
|
|
|
ALL_OBJS := $(TOP_OBJ) $(CORE_OBJS) $(CFF_OBJS) $(DP_OBJS) $(EB_OBJS) $(PK_OBJS) $(NFT_OBJS) $(OVL_OBJS)
|
|
|
|
.PHONY: all clean debug static help
|
|
|
|
all: $(BIN)
|
|
|
|
$(BIN): $(ALL_OBJS)
|
|
$(CC) $(CFLAGS) $(LDFLAGS) -o $@ $^
|
|
|
|
# Generic compile: any .c → corresponding .o under build/
|
|
$(BUILD)/%.o: %.c
|
|
@mkdir -p $(dir $@)
|
|
$(CC) $(CFLAGS) -Icore -I$(CFF_DIR)/src -c -o $@ $<
|
|
|
|
debug: CFLAGS := -O0 -g3 -Wall -Wextra -Wno-unused-parameter -D_GNU_SOURCE -D_FILE_OFFSET_BITS=64
|
|
debug: clean $(BIN)
|
|
|
|
static: LDFLAGS += -static
|
|
static: clean $(BIN)
|
|
|
|
clean:
|
|
rm -rf $(BUILD) $(BIN)
|
|
|
|
help:
|
|
@echo "Targets:"
|
|
@echo " make build optimized iamroot binary"
|
|
@echo " make debug build with -O0 -g3"
|
|
@echo " make static build a fully static binary"
|
|
@echo " make clean remove build artifacts"
|
|
@echo ""
|
|
@echo "Per-module (legacy) — not built by default:"
|
|
@echo " cd modules/copy_fail_family && make"
|