SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Abstract

While the number of vulnerabilities in the Linux kernel has increased significantly in recent years, most have limited capabilities, such as corrupting a few bytes in restricted allocator caches. To elevate their capabilities, security researchers have proposed software cross-cache attacks, exploiting the memory reuse of the kernel allocator. However, such cross-cache attacks are impractical due to their low success rate of only 40 %, with failure scenarios often resulting in a system crash.

In this paper, we present SLUBStick, a novel kernel exploitation technique elevating a limited heap vulnerability to an arbitrary memory read-and-write primitive. SLUBStick operates in multiple stages: Initially, it exploits a timing side channel of the allocator to perform a cross-cache attack reliably. Concretely, exploiting the side-channel leakage pushes the success rate to above 99 % for frequently used generic caches. SLUBStick then exploits code patterns prevalent in the Linux kernel to convert a limited heap vulnerability into a page table manipulation, thereby granting the capability to read and write memory arbitrarily. We demonstrate the applicability of SLUBStick by systematically analyzing two Linux kernel versions, v5.19 and v6.2. Lastly, we evaluate SLUBStick with a synthetic vulnerability and 9 real-world CVEs, showcasing privilege escalation and container escape in the Linux kernel with state-of-the-art kernel defenses enabled.
Original languageEnglish
Title of host publicationUsenix Security Symposium 2024
Place of PublicationPhiladelphia, PA
PublisherUSENIX Association
Pages4051-4068
ISBN (Electronic)978-1-939133-44-1
Publication statusPublished - Aug 2024
Event33rd USENIX Security Symposium: USENIX Security 2024 - Philadelphia Marriott Downtown, Philadelphia, United States
Duration: 14 Aug 202416 Aug 2024
https://www.usenix.org/conference/usenixsecurity24

Conference

Conference33rd USENIX Security Symposium: USENIX Security 2024
Abbreviated titleUSENIX
Country/TerritoryUnited States
CityPhiladelphia
Period14/08/2416/08/24
Internet address

Fingerprint

Dive into the research topics of 'SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel'. Together they form a unique fingerprint.

Cite this