漏洞标题
内核SU签名验证不匹配
漏洞描述信息
KernelSU是适用于Android的基于内核的root解决方案。从版本0.6.1开始,直到版本0.7.0,如果一个安装了KernelSU的设备被一个特别构造了应用签名块的恶意软件感染,恶意软件可以接管设备的root权限。易受攻击的验证逻辑实际上获取了标识符为`0x7109871a`的最后一个块的签名,而Android安装期间的验证逻辑则是获取第一个块的签名。除了已修复的实际签名升级问题(KernelSU认为它是V2,但实际上它是V3)之外,还存在实际签名降级的问题(KernelSU认为它是V2,但实际上它是V1)。在签名验证逻辑中找到了一个会导致签名未找到错误的条件,而KernelSU并未实现相同的条件,因此KernelSU认为存在V2签名,但APK签名验证实际上使用的却是V1签名。此问题已在版本0.7.0中修复。作为临时解决办法,建议保持KernelSU管理器的安装状态,并避免安装未知应用。
CVSS信息
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
漏洞类别
密码学签名的验证不恰当
漏洞标题
KernelSU signature validation mismatch
漏洞描述信息
KernelSU is a Kernel based root solution for Android. Starting in version 0.6.1 and prior to version 0.7.0, if a KernelSU installed device is infected with a malware whose app signing block specially constructed, it can take over root privileges on the device. The vulnerable verification logic actually obtains the signature of the last block with an id of `0x7109871a`, while the verification logic during Android installation is to obtain the first one. In addition to the actual signature upgrade that has been fixed (KSU thought it was V2 but was actually V3), there is also the problem of actual signature downgrading (KSU thought it was V2 but was actually V1). Find a condition in the signature verification logic that will cause the signature not to be found error, and KernelSU does not implement the same conditions, so KSU thinks there is a V2 signature, but the APK signature verification actually uses the V1 signature. This issue is fixed in version 0.7.0. As workarounds, keep the KernelSU manager installed and avoid installing unknown apps.
CVSS信息
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L
漏洞类别
授权机制不正确
漏洞标题
KernelSU 安全漏洞
漏洞描述信息
kernelsu是一种基于内核的Android设备获取root权限的方案。 KernelSU 0.6.1至0.7.0之前版本存在安全漏洞,该漏洞源于允许攻击者通过构建应用程序signing block利用恶意软件接管设备上的root权限。
CVSS信息
N/A
漏洞类别
其他