Linux-Kernel durch neuen SLUBStick-Cross-Cache-Angriff beeinträchtigt

Teilen:

A novel Linux Kernel cross-cache attack named SLUBStick has a 99% success in converting a limited heap vulnerability into an arbitrary memory read-and-write capability, letting the researchers elevate privileges or escape containers.

The discovery comes from a team of researchers from the Graz University of Technology who demonstrated the attack on Linux kernel versions 5.9 and 6.2 (latest) using nine existing CVEs in both 32-bit and 64-bit systems, indicating high versatility.

Additionally, the attack worked with all modern kernel defenses like Supervisor Mode Execution Prevention (SMEP),  Supervisor Mode Access Prevention (SMAP), and Kernel Address Space Layout Randomization (KASLR) active.

SLUBStick will be presented in detail at the upcoming Usenix Security Symposium conference later this month. The researchers will showcase privilege escalation and container escape in the latest Linux with state-of-the-art defenses enabled.

In the meantime, the published technical paper contains all the details about the attack and the potential exploitation scenarios.

SLUBStick details

One way the Linux kernel manages memory efficiently and securely is by allocating and de-allocating memory chunks, called “slabs,” for different types of data structures.

Flaws in this memory management process may allow attackers to corrupt or manipulate data structures, called cross-cache attacks. However, these are effective roughly 40% of the time and typically lead to system crashes sooner or later.

SLUBStick exploits a heap vulnerability, such as a double-free, user-after-free, or out-of-bounds write, to manipulate the memory allocation process.

Next, it uses a timing side channel to determine the exact moment of memory chunk allocation/deallocation, allowing the attacker to predict and control memory reuse.

Using this timing information raises the success of the cross-change exploitation to 99%, making SLUBStick very practical.

The conversion of the heap flaw into arbitrary memory read-and-write primitive is done in three steps:

  • Free specific memory chunks and wait for the kernel to reuse them.
  • Reallocate these chunks in a controlled manner, ensuring they get repurposed for critical data structures like page tables.
  • Once reclaimed, the attacker overwrites the page table entries, getting the ability to read and write any memory location.

Real-world impact

As with most attacks involving a side channel, SLUBStick requires local access on the target machine with code execution capabilities. Furthermore, the attack requires the presence of a heap vulnerability in the Linux kernel, which will then be used to gain read and write access to the memory.

While this may make the attack appear impractical, it does introduce some benefits to attackers.

Even for attackers with code execution capabilities, SLUBStick provides the ability to achieve privilege escalation, bypass kernel defenses, perform container escapes, or use it as part of a complex attack chain.

Privilege escalation can be used to elevate privileges to root, allowing unlimited operations, while container escape can be used to break from sandboxed environments and access the host system.

Additionally, in the post-exploitation phase, SLUBStick could modify kernel structures or hooks to maintain persistence, making malware harder for defenders to detect.

Those who want to dive deeper into SLUBStick and experiment with the exploits used by the Graz University researchers can find them in the researcher’s GitHub repository.

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
1:30 am, Juni 21, 2025
Wetter-Symbol 18°C
L: 17° | H: 19°
klarer Himmel
Luftfeuchtigkeit: 75 %
Druck: 1020 mb
Wind: 9 mph E
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 4%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:43 am
Sonnenuntergang: 9:21 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
17° | 19°°C 0.25 mm 25% 9 mph 70 % 1020 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
17° | 26°°C 1 mm 100% 16 mph 88 % 1014 mb 0 mm/h
Mo. Juni 23 10:00 pm
Wetter-Symbol
15° | 24°°C 0.2 mm 20% 14 mph 77 % 1017 mb 0 mm/h
Di. Juni 24 10:00 pm
Wetter-Symbol
14° | 25°°C 0 mm 0% 12 mph 76 % 1017 mb 0 mm/h
Mi. Juni 25 10:00 pm
Wetter-Symbol
17° | 20°°C 1 mm 100% 11 mph 82 % 1011 mb 0 mm/h
Today 4:00 am
Wetter-Symbol
17° | 18°°C 0 mm 0% 5 mph 70 % 1020 mb 0 mm/h
Today 7:00 am
Wetter-Symbol
20° | 20°°C 0 mm 0% 6 mph 57 % 1019 mb 0 mm/h
Today 10:00 am
Wetter-Symbol
27° | 27°°C 0 mm 0% 8 mph 34 % 1018 mb 0 mm/h
Today 1:00 pm
Wetter-Symbol
30° | 30°°C 0 mm 0% 9 mph 25 % 1017 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
33° | 33°°C 0 mm 0% 8 mph 25 % 1016 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
30° | 30°°C 0 mm 0% 8 mph 28 % 1014 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
25° | 25°°C 0.25 mm 25% 6 mph 42 % 1014 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
20° | 20°°C 1 mm 100% 4 mph 74 % 1013 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€89,597.85
-1.31%
Ethereum(ETH)
€2,086.00
-4.75%
Fesseln(USDT)
€0.87
0.00%
XRP(XRP)
€1.84
-2.21%
Solana(SOL)
€121.44
-4.66%
USDC(USDC)
€0.87
0.00%
Dogecoin(DOGE)
€0.141113
-4.94%
Shiba Inu(SHIB)
€0.000010
-2.24%
Pepe(PEPE)
€0.000009
-3.80%
Peanut das Eichhörnchen(PNUT)
€0.218233
13.10%
Nach oben scrollen