5d48a7b0b5
Two additions on top of v0.7.0:
1. skeletonkey-arm64-static is now published alongside the existing
x86_64-static binary. Built native-arm64 in Alpine via GitHub's
ubuntu-24.04-arm runner pool (free for public repos as of 2024).
install.sh auto-picks it based on 'uname -m'; SKELETONKEY_DYNAMIC=1
fetches the dynamic build instead. Works on Raspberry Pi 4+, Apple
Silicon Linux VMs, AWS Graviton, Oracle Ampere, Hetzner ARM, etc.
.github/workflows/release.yml refactor: the previous single
build-static-x86_64 job becomes a build-static matrix with two
entries (x86_64-static on ubuntu-latest, arm64-static on
ubuntu-24.04-arm). Both share the same Alpine container + build
recipe.
2. .arch_support field on struct skeletonkey_module — honest per-module
labeling of which architectures the exploit() body has been verified
on. Three categories:
'any' (4 modules): pwnkit, sudo_samedit, sudoedit_editor,
pack2theroot. Purely userspace; arch-independent.
'x86_64' (1 module): entrybleed. KPTI prefetchnta side-channel;
x86-only by physics. Already source-gated (returns
PRECOND_FAIL on non-x86_64).
'x86_64+unverified-arm64' (26 modules): kernel exploitation
code. The bug class is generic but the exploit primitives
(msg_msg sprays, finisher chain, struct offsets) haven't been
confirmed on arm64. detect() still works (just reads ctx->host);
only the --exploit path is in question.
--list now has an ARCH column (any / x64 / x64?) and the footer
prints 'N arch-independent (any)'.
--module-info prints 'arch support: <value>'.
--scan --json adds 'arch_support' to each module record.
This is the honest 'arm64 works for detection on every module +
exploitation on 4 of them today; the rest await empirical arm64
sweep' framing — not pretending the kernel exploits already work
there, but not blocking the arm64 binary on that either. arm64
users get the full triage workflow + a handful of userspace exploits
out of the box, plus a clear roadmap for the rest.
Future work to promote modules from 'x86_64+unverified-arm64' to
'any': add an arm64 Vagrant box (generic/debian12-arm64 etc.) to
tools/verify-vm/ and run a verification sweep on Apple Silicon /
ARM Linux hardware.
175 lines
5.8 KiB
YAML
175 lines
5.8 KiB
YAML
name: release
|
|
|
|
# Triggers on semver tag push (v0.1.0, v0.1.1, etc.). Builds release
|
|
# artifacts for x86_64 and arm64, then publishes them on a GitHub
|
|
# Release matching the tag.
|
|
#
|
|
# Maintainer flow:
|
|
# git tag v0.1.0
|
|
# git push origin v0.1.0
|
|
# → CI builds + publishes release with skeletonkey-x86_64 + skeletonkey-arm64
|
|
|
|
on:
|
|
push:
|
|
tags: ['v*.*.*']
|
|
workflow_dispatch: # allow manual re-runs
|
|
|
|
permissions:
|
|
contents: write # needed by softprops/action-gh-release
|
|
|
|
jobs:
|
|
build:
|
|
strategy:
|
|
fail-fast: false
|
|
matrix:
|
|
include:
|
|
- target: x86_64
|
|
cc: gcc
|
|
apt: build-essential
|
|
- target: arm64
|
|
cc: aarch64-linux-gnu-gcc
|
|
apt: build-essential gcc-aarch64-linux-gnu libc6-dev-arm64-cross linux-libc-dev-arm64-cross
|
|
name: build (${{ matrix.target }})
|
|
runs-on: ubuntu-latest
|
|
steps:
|
|
- uses: actions/checkout@v4
|
|
|
|
- name: install build deps
|
|
run: |
|
|
sudo apt-get update -qq
|
|
sudo apt-get install -y --no-install-recommends ${{ matrix.apt }} linux-libc-dev
|
|
|
|
- name: build
|
|
env:
|
|
CC: ${{ matrix.cc }}
|
|
run: |
|
|
make
|
|
file skeletonkey
|
|
ls -la skeletonkey
|
|
|
|
- name: rename + checksum
|
|
run: |
|
|
mv skeletonkey skeletonkey-${{ matrix.target }}
|
|
sha256sum skeletonkey-${{ matrix.target }} > skeletonkey-${{ matrix.target }}.sha256
|
|
|
|
- uses: actions/upload-artifact@v4
|
|
with:
|
|
name: skeletonkey-${{ matrix.target }}
|
|
path: |
|
|
skeletonkey-${{ matrix.target }}
|
|
skeletonkey-${{ matrix.target }}.sha256
|
|
|
|
# Portable static-musl builds. Run in Alpine (native musl +
|
|
# linux-headers) so the resulting binary works on every libc —
|
|
# glibc 2.x of any version, musl, etc. This is what install.sh
|
|
# fetches by default (the dynamic binary above hits a glibc-
|
|
# version ceiling on older distros like Debian 12 / RHEL 8).
|
|
#
|
|
# x86_64-static runs on the regular x86_64 runner pool.
|
|
# arm64-static runs on GitHub's native ARM Linux runners
|
|
# (free for public repos as of 2024). Both produce statically-
|
|
# linked binaries that just need an executable Linux kernel of
|
|
# the right ABI.
|
|
build-static:
|
|
strategy:
|
|
fail-fast: false
|
|
matrix:
|
|
include:
|
|
- target: x86_64-static
|
|
runner: ubuntu-latest
|
|
- target: arm64-static
|
|
runner: ubuntu-24.04-arm
|
|
runs-on: ${{ matrix.runner }}
|
|
name: build (${{ matrix.target }} / musl)
|
|
container:
|
|
image: alpine:latest
|
|
steps:
|
|
- uses: actions/checkout@v4
|
|
|
|
- name: install build deps
|
|
run: |
|
|
apk add --no-cache build-base linux-headers tar
|
|
|
|
- name: build static (musl)
|
|
run: |
|
|
# MSG_COPY is a Linux-only SysV msg flag that glibc defines
|
|
# but musl does not — netfilter_xtcompat needs it. Define
|
|
# the kernel constant explicitly. (Kernel: include/uapi/
|
|
# linux/msg.h: MSG_COPY = 040000)
|
|
make CFLAGS="-O2 -Wall -Wextra -Wno-unused-parameter -Wno-pointer-arith -D_GNU_SOURCE -D_FILE_OFFSET_BITS=64 -DMSG_COPY=040000" LDFLAGS=-static
|
|
file skeletonkey
|
|
ls -la skeletonkey
|
|
|
|
- name: rename + checksum
|
|
run: |
|
|
mv skeletonkey skeletonkey-${{ matrix.target }}
|
|
sha256sum skeletonkey-${{ matrix.target }} > skeletonkey-${{ matrix.target }}.sha256
|
|
|
|
- uses: actions/upload-artifact@v4
|
|
with:
|
|
name: skeletonkey-${{ matrix.target }}
|
|
path: |
|
|
skeletonkey-${{ matrix.target }}
|
|
skeletonkey-${{ matrix.target }}.sha256
|
|
|
|
release:
|
|
needs: [build, build-static]
|
|
runs-on: ubuntu-latest
|
|
steps:
|
|
- uses: actions/checkout@v4
|
|
|
|
- uses: actions/download-artifact@v4
|
|
with:
|
|
path: dist
|
|
|
|
- name: flatten artifacts
|
|
run: |
|
|
find dist -type f -exec mv {} . \;
|
|
ls -la skeletonkey-*
|
|
|
|
- name: collect release notes
|
|
id: notes
|
|
run: |
|
|
tag="${GITHUB_REF#refs/tags/}"
|
|
echo "tag=$tag" >> "$GITHUB_OUTPUT"
|
|
# Prefer the hand-written release notes if present (richer
|
|
# per-release context); otherwise fall back to an auto-generated
|
|
# stub with install instructions + pointers to docs.
|
|
if [ -f docs/RELEASE_NOTES.md ]; then
|
|
cp docs/RELEASE_NOTES.md release-notes.md
|
|
else
|
|
{
|
|
echo "## SKELETONKEY $tag"
|
|
echo
|
|
echo "Pre-built binaries for x86_64 (dynamic + static-musl) and arm64."
|
|
echo "Checksums alongside each artifact."
|
|
echo
|
|
echo "### Install"
|
|
echo '```bash'
|
|
echo "curl -sSL https://github.com/${GITHUB_REPOSITORY}/releases/download/${tag}/install.sh | sh"
|
|
echo "skeletonkey --version"
|
|
echo '```'
|
|
echo
|
|
echo "See [\`CVES.md\`](https://github.com/${GITHUB_REPOSITORY}/blob/${tag}/CVES.md) for the CVE inventory."
|
|
echo "See [\`docs/RELEASE_NOTES.md\`](https://github.com/${GITHUB_REPOSITORY}/blob/${tag}/docs/RELEASE_NOTES.md) for per-release detail."
|
|
} > release-notes.md
|
|
fi
|
|
|
|
- name: publish release
|
|
uses: softprops/action-gh-release@v2
|
|
with:
|
|
tag_name: ${{ steps.notes.outputs.tag }}
|
|
name: SKELETONKEY ${{ steps.notes.outputs.tag }}
|
|
body_path: release-notes.md
|
|
files: |
|
|
skeletonkey-x86_64
|
|
skeletonkey-x86_64.sha256
|
|
skeletonkey-x86_64-static
|
|
skeletonkey-x86_64-static.sha256
|
|
skeletonkey-arm64
|
|
skeletonkey-arm64.sha256
|
|
skeletonkey-arm64-static
|
|
skeletonkey-arm64-static.sha256
|
|
install.sh
|
|
fail_on_unmatched_files: false # install.sh may not exist at first tag
|