Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <76068f31-76ca-4186-9025-48dfd5be4a5c@h.wer.ee>
Date: Wed, 22 Apr 2026 22:58:00 -0700
From: h <h@...er.ee>
To: lkrg-users@...ts.openwall.com
Subject: Re: LKRG 1.0.1

I have been running lkrg from git via the lkrg-git AUR package on my 
desktop, which gets used in both desktop and server roles, for a while 
due to running into the issue with a solution described as "Fix possible 
livelock when freezing inter-dependent tasks on LKRG load (was observed 
with systemd-userd vs. proc-sys-fs-binfmt_misc.mount)" at one point, 
should I move to using a stable release of lkrg from now on until and 
unless I encounter more issues, or is it appreciated to have people 
running development builds in production?

On 4/22/26 10:43 PM, Solar Designer wrote:
> Hi,
>
> For those new to Linux Kernel Runtime Guard (LKRG), it is a kernel
> module that performs runtime integrity checking of the Linux kernel and
> detection of security vulnerability exploits against the kernel.
>
> We've just released LKRG 1.0.1, available on the LKRG project website:
>
> https://lkrg.org
>
> The following major changes have been made between LKRG 1.0.0 and 1.0.1:
>
>   *) Support Linux 6.19+ (tested up to and including 7.0)
>   *) Verify newly loaded modules do appear in the module list (catches e.g.
>      the Singularity rootkit hiding itself on load, stops it by kernel panic)
>   *) Try harder at killing compromised tasks (beyond SIGKILL sent by usual
>      means, so e.g. Singularity's attempt to suppress SIGKILL doesn't help it)
>   *) Replace inconsistent uses of notrace in the source files with removal of
>      trace-related CFLAGS in Makefile (so a rootkit can't place ftrace hooks on
>      LKRG functions, which an older revision of Singularity did)
>   *) Fix possible livelock when freezing inter-dependent tasks on LKRG load
>      (was observed with systemd-userd vs. proc-sys-fs-binfmt_misc.mount)
>   *) Fix possible use-after-free when accessing another task's shadow data on
>      kernels since 3.17 but below 4.20
>   *) Fix possible sleeping-in-atomic on lkrg.msr_validate sysctl updates
>   *) pCFI: Fix potential kernel stack out of bounds read (which didn't matter)
>   *) Fix possible seccomp deadlock when a thread's off flag is corrupted (which
>      can't happen without another issue or kernel compromise)
>
> While 3 items above mention the recently publicized Singularity rootkit,
> which "bypassed" LKRG, addressing this wasn't directly relevant for LKRG
> yet.  That's because LKRG is not currently meant to protect against
> kernel modules loaded by legitimate-looking root user, who could simply
> unload or reconfigure LKRG first (although doing so logs a message,
> including to a remote server if configured).  Rather, we took this
> opportunity and used Singularity as our reminder and test suite to
> identify areas for general hardening of LKRG, and to test such hardening
> changes.  This may also become directly relevant later, such as if we
> add unload and reconfiguration protection.
>
> I'd like to thank Matheu for creating and maintaining our new test
> suite, Singularity.  I see it has already been further updated two days
> ago, which may give us more ideas for hardening.  We keep track of these
> in a GitHub issue:
>
> https://github.com/lkrg-org/lkrg/issues/455
>
> There's not much change in codebase size this time:
>
> $ git diff --shortstat v1.0.0..v1.0.1
>   39 files changed, 441 insertions(+), 155 deletions(-)
>
> The changes this time are by the following people:
>
> $ git shortlog -sn v1.0.0..v1.0.1
>      16  Solar Designer
>       8  Adam 'pi3' Zabrocki
>       8  Sultan Alsawaf
>       1  Vitaly Chikunov
>
> So just our current development team.
>
> I'd like to credit CIQ for supporting my and Sultan's work towards this
> release.
>
> We've already updated the Rocky Linux SIG/Security package of LKRG to
> this new release, and our tested builds for 9.7 and 8.10 are about to be
> pushed out to the public, along with a pending edit of the wiki:
>
> https://sig-security.rocky.page
>
> This may take a day or two to become fully available.
>
> Rocky Linux SIG/Security yum/dnf repository and LKRG packages are also
> usable on other Enterprise Linux distributions (AlmaLinux 8 and 9, RHEL
> 8 and 9, etc.)
>
> Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.