This policy covers the WSA x86_64 ReSukiSU + SUSFS + KPM kernel maintained at Ognisty321/WSA-Linux-Kernel and its companion ReSukiSU fork at Ognisty321/ReSukiSU.
Issues in upstream Linux, upstream KernelSU, upstream ReSukiSU or upstream SUSFS that are not specific to this WSA x86_64 port should be reported to those projects.
Security fixes target the current main branch and the latest release listed in the WSA kernel release page. Older local build artifacts are supported only when the issue reproduces on current main or the latest release.
If you believe you have found a security vulnerability in this kernel or KPM port, please do not open a public issue. Instead:
- Open a private security advisory at https://github.com/Ognisty321/WSA-Linux-Kernel/security/advisories/new.
- Include a clear description, a minimal reproduction, the kernel SHA256 you tested and the WSA version.
- Include
ksud kpm doctor --json,ksud kpm audit --json,adb shell uname -aand the relevantdmesglines when possible. - Include the Windows build, Memory Integrity state, ReSukiSU submodule commit and whether
/data/adb/kpm.disabledexists. - Allow a reasonable time for a fix before any public disclosure.
- Memory corruption, use after free, out of bounds, double free in the KPM loader and hook backend.
- Privilege escalation paths in the supercall /
ksud kpminterface. - KPM loader parser bugs reachable from a crafted
.kpmfile. - Hook restore correctness bugs that can leave kernel text in an inconsistent state.
- Userspace command bugs that report success after a kernel-side KPM failure.
- Boot-time KPM autoload failures that bypass
/data/adb/kpm.disabledrecovery behavior.
- Issues that require a malicious actor with existing root and kernel write access.
- Vendor specific Android driver bugs not present in WSA.
- Issues in upstream projects not patched by this fork.
- Issues that depend on Memory Integrity being explicitly disabled on the host.