Skip to content

Commit

Permalink
Drop all "wikilink" hover tags from the conversion
Browse files Browse the repository at this point in the history
Signed-off-by: Kees Cook <[email protected]>
  • Loading branch information
kees committed Jul 4, 2024
1 parent ef243b2 commit a2251ec
Show file tree
Hide file tree
Showing 14 changed files with 39 additions and 39 deletions.
2 changes: 1 addition & 1 deletion Bug_Classes/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,4 +6,4 @@ on classes of bugs that have security implications, explain them, link
to examples, and link to defenses that are or could be used to entirely
eliminate the bug class.

[Kernel Self Protection Project](/ "wikilink")
[Kernel Self Protection Project](/)
6 changes: 3 additions & 3 deletions Exploit_Methods/Kernel_location.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,19 +4,19 @@ Finding the kernel location can be an important first step for
exploitation. Without it, for example, it's harder to make kernel
function calls for privilege escalation. Besides the kernel itself, lots
of other locations may be valuable to an attacker. See [Kernel pointer
leaks](Bug_Classes/Kernel_pointer_leak "wikilink") for more information.
leaks](Bug_Classes/Kernel_pointer_leak) for more information.

# Examples

- See [Kernel pointer
leaks](Bug_Classes/Kernel_pointer_leak "wikilink") examples
leaks](Bug_Classes/Kernel_pointer_leak) examples
- /proc/kallsyms, /proc/modules
- [ksymhunter](https://github.com/jonoberheide/ksymhunter)

# Mitigations

- hide symbols and kernel pointers (see [Kernel pointer
leaks](Bug_Classes/Kernel_pointer_leak "wikilink"))
leaks](Bug_Classes/Kernel_pointer_leak))
- [kernel
ASLR](https://git.kernel.org/linus/8ab3820fd5b2896d66da7bb2a906bc382e63e7bc)
- runtime randomization of kernel functions
Expand Down
2 changes: 1 addition & 1 deletion Exploit_Methods/Userspace_data_usage.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ exploitation.

Note that under some emulation situations, this can be a superset that
includes [Userspace
execution](Exploit_Methods/Userspace_execution "wikilink"). (If we can
execution](Exploit_Methods/Userspace_execution). (If we can
protect against userspace access, we'll also be protecting against
userspace execution.) Hardware protections tend to be separate, though,
due to different memory paths for instruction fetch (execution) and data
Expand Down
6 changes: 3 additions & 3 deletions Exploit_Methods/Userspace_execution.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,14 +7,14 @@ malicious code in userspace and have the kernel redirection execution
there. (Frequently known as "ret2usr".)

For more details, see [Userspace
access](Exploit_Methods/Userspace_data_usage "wikilink"), as that can be
access](Exploit_Methods/Userspace_data_usage), as that can be
superset of userspace execution under some emulation situations.

# Examples

- See nearly every other exploit example listed under other [Exploit
Methods](Exploit_Methods "wikilink") and [Bug
Classes](Bug_Classes "wikilink").
Methods](Exploit_Methods) and [Bug
Classes](Bug_Classes).

# Mitigations

Expand Down
4 changes: 2 additions & 2 deletions Exploit_Methods/index.md
Original file line number Diff line number Diff line change
@@ -1,10 +1,10 @@
Exploit Methods
===============

When [bugs](Bug_Classes "wikilink") in the kernel provide unintended
When [bugs](Bug_Classes) in the kernel provide unintended
read and write primitives to an attacker, there are many techniques used
to gain execution control over the kernel. Here we try to explain them,
link to examples, and link to defenses that are or could be used to
eliminate an exploitation method.

[Kernel Self Protection Project](/ "wikilink")
[Kernel Self Protection Project](/)
2 changes: 1 addition & 1 deletion Get_Involved.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ Get Involved
============

Want to get involved in the [Kernel Self Protection
Project](Kernel_Self_Protection_Project "wikilink")? Here's how:
Project](Kernel_Self_Protection_Project)? Here's how:

# Join the conversations

Expand Down
2 changes: 1 addition & 1 deletion KSPP.md
Original file line number Diff line number Diff line change
@@ -1 +1 @@
1. REDIRECT [Kernel Self Protection Project](/ "wikilink")
1. REDIRECT [Kernel Self Protection Project](/)
2 changes: 1 addition & 1 deletion Kernel_Protections/HARDENED_ATOMIC.md
Original file line number Diff line number Diff line change
@@ -1,2 +1,2 @@
1. REDIRECT [Kernel Protections/refcount
t](Kernel_Protections/refcount_t "wikilink")
t](Kernel_Protections/refcount_t)
2 changes: 1 addition & 1 deletion Kernel_Protections/refcount_t.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

The refcount_t API is a kernel self-protection mechanism that greatly
helps with the prevention of
[use-after-free](Bug_Classes/Use_after_free "wikilink") bugs. It is
[use-after-free](Bug_Classes/Use_after_free) bugs. It is
based off of work done by the [PaX Team](https://pax.grsecurity.net),
originally called
[PAX_REFCOUNT](https://forums.grsecurity.net/viewtopic.php?f=7&t=4173).
Expand Down
2 changes: 1 addition & 1 deletion Kernel_Self_Protection_Project/index.md
Original file line number Diff line number Diff line change
@@ -1 +1 @@
1. REDIRECT [Kernel Self Protection Project](/ "wikilink")
1. REDIRECT [Kernel Self Protection Project](/)
2 changes: 1 addition & 1 deletion Patch_Tracking.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ Patch Tracking
# Overview

The primary place where
[KSPP](Kernel_Self_Protection_Project "wikilink") patches are tracked is
[KSPP](Kernel_Self_Protection_Project) patches are tracked is
through our [patchwork
instance](https://patchwork.kernel.org/project/linux-hardening/list/).
This helps collect Reviewed-by, Acked-by, Tested-by, etc, tags in a
Expand Down
2 changes: 1 addition & 1 deletion Recommended_Settings.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ Recommended Settings
====================

Sometimes people ask the [Kernel Self Protection
Project](Kernel_Self_Protection_Project "wikilink") what a secure set of
Project](Kernel_Self_Protection_Project) what a secure set of
build CONFIGs and runtime settings are. This is a brain-dump of the
various options for a particularly paranoid system.

Expand Down
34 changes: 17 additions & 17 deletions Work.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,35 +4,35 @@ Areas of Work Needed
# Work Areas

The [Kernel Self Protection
Project](Kernel_Self_Protection_Project "wikilink") has a lot of work to
Project](Kernel_Self_Protection_Project) has a lot of work to
do\! While there are already a number of upstream [kernel security
features](Feature_List "wikilink"), we are still missing many.
features](Feature_List), we are still missing many.

For the list of specific items and desired features, see the [KSPP Issue
Tracker](https://github.com/KSPP/linux/issues).

General concepts and concerns are here:

## [Bug Classes](Bug_Classes "wikilink")
## [Bug Classes](Bug_Classes)

- [Stack overflow](Bug_Classes/Stack_overflow "wikilink")
- [Integer overflow](Bug_Classes/Integer_overflow "wikilink")
- [Heap overflow](Bug_Classes/Heap_overflow "wikilink")
- [Stack overflow](Bug_Classes/Stack_overflow)
- [Integer overflow](Bug_Classes/Integer_overflow)
- [Heap overflow](Bug_Classes/Heap_overflow)
- [Format string
injection](Bug_Classes/Format_string_injection "wikilink")
- [Kernel pointer leak](Bug_Classes/Kernel_pointer_leak "wikilink")
injection](Bug_Classes/Format_string_injection)
- [Kernel pointer leak](Bug_Classes/Kernel_pointer_leak)
- [Uninitialized
variables](Bug_Classes/Uninitialized_variables "wikilink")
- [Use-after-free](Bug_Classes/Use_after_free "wikilink")
variables](Bug_Classes/Uninitialized_variables)
- [Use-after-free](Bug_Classes/Use_after_free)

## [Exploitation Methods](Exploit_Methods "wikilink")
## [Exploitation Methods](Exploit_Methods)

- [Kernel location](Exploit_Methods/Kernel_location "wikilink")
- [Text overwrite](Exploit_Methods/Text_overwrite "wikilink")
- [Kernel location](Exploit_Methods/Kernel_location)
- [Text overwrite](Exploit_Methods/Text_overwrite)
- [Function pointer
overwrite](Exploit_Methods/Function_pointer_overwrite "wikilink")
overwrite](Exploit_Methods/Function_pointer_overwrite)
- [Userspace
execution](Exploit_Methods/Userspace_execution "wikilink")
execution](Exploit_Methods/Userspace_execution)
- [Userspace data
usage](Exploit_Methods/Userspace_data_usage "wikilink")
- [Reused code chunks](Exploit_Methods/Reused_code_chunks "wikilink")
usage](Exploit_Methods/Userspace_data_usage)
- [Reused code chunks](Exploit_Methods/Reused_code_chunks)
10 changes: 5 additions & 5 deletions index.md
Original file line number Diff line number Diff line change
Expand Up @@ -60,10 +60,10 @@ features:

Specific details on the project:

- [Get Involved](Get_Involved "wikilink")
- [Areas of Work Needed](Work "wikilink")
- [Recommended Kernel Settings](Recommended_Settings "wikilink")
- [Patch Tracking](Patch_Tracking "wikilink")
- [Get Involved](Get_Involved)
- [Areas of Work Needed](Work)
- [Recommended Kernel Settings](Recommended_Settings)
- [Patch Tracking](Patch_Tracking)

# Documentation

Expand All @@ -72,7 +72,7 @@ that have specific documentation:

- [Self-Protection
Guidelines](https://www.kernel.org/doc/html/latest/security/self-protection.html)
- [refcount_t](Kernel_Protections/refcount_t "wikilink") Kernel
- [refcount_t](Kernel_Protections/refcount_t) Kernel
reference counter overflow protection
- [Analysis on Kernel Self-Protection: Understanding Security and
Performance Implication](https://samsung.github.io/kspp-study/)
Expand Down

0 comments on commit a2251ec

Please sign in to comment.