New Linux kernel cross-cache attack allows arbitrary memory writes

linux code binary



By employing a timing side channel while exploiting the heap vulnerabilities, which essentially allow attackers to manipulate the kernel’s memory allocation process, the researchers were able to pinpoint the exact moment of memory allocation and de-allocation, making the determination of frequently used caches extremely accurate.

These caches are then shown to be reallocated to allow attackers to manipulate the page table and read and write any memory allocation. SLUBStick can work with at least nine existing exploitations, including CVE-2023-21400, CVE-2023-3609, CVE-2022-32250, CVE-2022-29582, CVE-2022-27666, CVE-2022-2588, CVE-2022-0995, CVE-2021-4157, and CVE-2021-3492.

Effective with pre-requisites

The attack was found effective against all modern kernel defenses, including Supervisor Mode Execution Prevention (SMEP), Supervisor Mode Access Prevention (SMAP), and Kernel Address Space Layout Randomization (KASLR).



Source link
lol

By employing a timing side channel while exploiting the heap vulnerabilities, which essentially allow attackers to manipulate the kernel’s memory allocation process, the researchers were able to pinpoint the exact moment of memory allocation and de-allocation, making the determination of frequently used caches extremely accurate. These caches are then shown to be reallocated to allow…

Leave a Reply

Your email address will not be published. Required fields are marked *