Recently a use-after-free vulnerability was discovered in the Linux kernel TEE subsystem, up to and including version 5.15.11, and was assigned CVE-2021-44733.
At a first glance it did not seem to be exploitable for several reasons, however after some further analysis of the vulnerable code path and by implementing a crude proof-of-concept exploit it was possible to overwrite a function pointer in the kernel. No privilege escalation payload is presented in this post, however the entire environment for running OPTEE and the exploit is available for further testing, see ‘Setting up the environment’. CVE-2021-44733 - Fuzzing and exploitation of a use-after-free in the Linux kernel TEE subsystem
so.cl
CVE-2021-44733 - Fuzzing and exploitation of a use-after-free in the Linux TEE
Rascals are always sociable, and the chief sign that a man has any nobility in his character is the little pleasure he takes in others company. Arthur Schopenhauer
CVE-2021-44733 - Fuzzing and exploitation of a use-after-free in the Linux TEE