Linux kernel impacted by new SLUBStick cross-cache attack

![Linux](https://www.bleepstatic.com/content/hl-images/2024/05/31/Linux.jpg)A novel Linux Kernel cross-cache attack named SLUBStick has a 99% success in converting a limited heap vulnerability into an arbitrary memory read-and-write capability, letting the researchers elevate privileges or escape containers.The discovery comes from a team of researchers from the Graz University of Technology who demonstrated the attack on Linux kernel versions 5.9 and 6.2 (latest) using nine existing CVEs in both 32-bit and 64-bit systems, indicating high versatility.Additionally, the attack worked with all modern kernel defenses like Supervisor Mode Execution Prevention (SMEP), Supervisor Mode Access Prevention (SMAP), and Kernel Address Space Layout Randomization (KASLR) active.SLUBStick will be presented in detail at the upcoming [Usenix Security Symposium](https://www.usenix.org/conference/usenixsecurity24/presentation/maar-slubstick) conference later this month. The researchers will showcase privilege escalation and container escape in the latest Linux with state-of-the-art defenses enabled.In the meantime, the [published technical paper](https://www.stefangast.eu/papers/slubstick.pdf) contains all the details about the attack and the potential exploitation scenarios.SLUBStick details—————–One way the Linux kernel manages memory efficiently and securely is by allocating and de-allocating memory chunks, called ‘slabs,’ for different types of data structures.Flaws in this memory management process may allow attackers to corrupt or manipulate data structures, called cross-cache attacks. However, these are effective roughly 40% of the time and typically lead to system crashes sooner or later.SLUBStick exploits a heap vulnerability, such as a double-free, user-after-free, or out-of-bounds write, to manipulate the memory allocation process. ![CVEs successfully used in the researchers’ experiments](https://www.bleepstatic.com/images/news/u/1220909/2024/Papers/03/cves.jpg) **CVEs successfully used in the researchers’ experiments** *Source: stefangast.eu*Next, it uses a timing side channel to determine the exact moment of memory chunk allocation/deallocation, allowing the attacker to predict and control memory reuse.Using this timing information raises the success of the cross-change exploitation to 99%, making SLUBStick very practical. ![Measured success rates](https://www.bleepstatic.com/images/news/u/1220909/2024/Papers/03/success-rate.jpg) **Measured success rates** *Source: stefangast.eu*The conversion of the heap flaw into arbitrary memory read-and-write primitive is done in three steps:* Free specific memory chunks and wait for the kernel to reuse them.* Reallocate these chunks in a controlled manner, ensuring they get repurposed for critical data structures like page tables.* Once reclaimed, the attacker overwrites the page table entries, getting the ability to read and write any memory location.![SLUBStick overview](https://www.bleepstatic.com/images/news/u/1220909/2024/Papers/03/slubstick-3steps.jpg) **SLUBStick overview** *Source: stefangast.eu*Real-world impact—————–As with most attacks involving a side channel, SLUBStick requires local access on the target machine with code execution capabilities. Furthermore, the attack requires the presence of a heap vulnerability in the Linux kernel, which will then be used to gain read and write access to the memory.While this may make the attack appear impractical, it does introduce some benefits to attackers.Even for attackers with code execution capabilities, SLUBStick provides the ability to achieve privilege escalation, bypass kernel defenses, perform container escapes, or use it as part of a complex attack chain.Privilege escalation can be used to elevate privileges to root, allowing unlimited operations, while container escape can be used to break from sandboxed environments and access the host system.Additionally, in the post-exploitation phase, SLUBStick could modify kernel structures or hooks to maintain persistence, making malware harder for defenders to detect. ![Targeting /etc/passwd data](https://www.bleepstatic.com/images/news/u/1220909/2024/Papers/03/conversion.jpg) **Tampering with ‘/etc/passwd’ data** *Source: stefangast.eu*Those who want to dive deeper into SLUBStick and experiment with the exploits used by the Graz University researchers can find them in the [researcher’s GitHub repository](https://github.com/IAIK/SLUBStick). ### Related Articles:[New Play ransomware Linux version targets VMware ESXi VMs](https://www.bleepingcomputer.com/news/security/new-play-ransomware-linux-version-targets-vmware-esxi-vms/)[RCE bug in widely used Ghostscript library now exploited in attacks](https://www.bleepingcomputer.com/news/security/rce-bug-in-widely-used-ghostscript-library-now-exploited-in-attacks/)[Latest Intel CPUs impacted by new Indirector side-channel attack](https://www.bleepingcomputer.com/news/security/latest-intel-cpus-impacted-by-new-indirector-side-channel-attack/)[New regreSSHion OpenSSH RCE bug gives root on Linux servers](https://www.bleepingcomputer.com/news/security/new-regresshion-openssh-rce-bug-gives-root-on-linux-servers/)[Snowblind malware abuses Android security feature to bypass security](https://www.bleepingcomputer.com/news/security/snowblind-malware-abuses-android-security-feature-to-bypass-security/)

Related Tags:
NAICS: 81 – Other Services (except Public Administration)

NAICS: 541 – Professional

Scientific

Technical Services

NAICS: 518 – Computing Infrastructure Providers

Data Processing

Web Hosting

Related Services

NAICS: 51 – Information

NAICS: 813 – Religious

Grantmaking

Civic

Professional Services

Similar Services

M1038 – Execution Prevention

Blog: BleepingComputer

TA0003 – Persistence

TA0004 – Privilege Escalation

Associated Indicators:
null