Samsung: RKP Memory Corruption via...

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

As part of Samsung KNOX, Samsung phones include a security hypervisor called RKP (Real-time Kernel Protection), running in EL2. This hypervisor is meant to ensure that the HLOS kernel running in EL1 remains protected from exploits and aims to prevent privilege escalation attacks by "shielding" certain data structures within the hypervisor. During the initialization of RKP, a special command can be issued by EL1 kernel in order to mark the RKP read-only page as such in the stage 2 translation table. This command, "rkp_set_init_page_ro" (command code 0x51) has the following approximate high-level logic: ``` __int64 rkp_set_init_page_ro(struct args* args_buffer) { unsigned long page_pa = rkp_get_pa(args_buffer->arg0); if ( page_pa < rkp_get_pa(text) || page_pa >= rkp_get_pa(etext) ) { if ( !rkp_s2_page_change_permission(page_pa, 128LL, 0, 0) )// RO, XN return rkp_debug_log("Cred: Unable to set permission for init cred", 0LL, 0LL, 0LL); } else { rkp_debug_log("Good init CRED is within...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息