![]() |
|
Message-ID: <01d9ec74-27bb-4e41-9676-12ce028c503f@linux.com> Date: Fri, 5 Sep 2025 23:11:10 +0300 From: Alexander Popov <alex.popov@...ux.com> To: "kernel-hardening@...ts.openwall.com" <kernel-hardening@...ts.openwall.com>, linux-hardening@...r.kernel.org, kasan-dev <kasan-dev@...glegroups.com>, Kees Cook <keescook@...omium.org>, Kees Cook <kees@...nel.org>, Jann Horn <jannh@...gle.com>, Andrey Konovalov <andreyknvl@...il.com>, Marco Elver <elver@...gle.com>, Matteo Rizzo <matteorizzo@...gle.com>, Florent Revest <revest@...gle.com>, GONG Ruiqi <gongruiqi1@...wei.com>, Harry Yoo <harry.yoo@...cle.com>, Peter Zijlstra <peterz@...radead.org>, LKML <linux-kernel@...r.kernel.org> Subject: Slab allocator hardening and cross-cache attacks Hello! I published the article "Kernel-hack-drill and a new approach to exploiting CVE-2024-50264 in the Linux kernel": https://a13xp0p0v.github.io/2025/09/02/kernel-hack-drill-and-CVE-2024-50264.html It's about exploiting CVE-2024-50264, a race condition in AF_VSOCK sockets that happens between the connect() system call and a POSIX signal, resulting in a use-after-free (UAF). I chose Ubuntu Server 24.04 with OEM/HWE kernel as the target for my experiments. This kernel ships with kconfig options that neutralize naive heap spraying for UAF exploitation: - CONFIG_SLAB_BUCKETS=y, which creates a set of separate slab caches for allocations with user-controlled data; - CONFIG_RANDOM_KMALLOC_CACHES=y, which creates multiple copies of slab caches for normal kmalloc allocation and makes kmalloc randomly pick one based on code address. I used my pet project kernel-hack-drill to learn how cross-cache attacks behave on the kernel with slab allocator hardening turned on. Kernel-hack-drill is an open-source project (published under GPL-3.0) that provides a testing environment for learning and experimenting with Linux kernel vulnerabilities, exploit primitives, and kernel hardening features: https://github.com/a13xp0p0v/kernel-hack-drill In kernel-hack-drill, I developed several prototypes that implement cross-cache and cross-allocator attacks. The article thoroughly describes the procedure I used to debug them. After experimenting with kernel-hack-drill on Ubuntu Server 24.04, I found that CONFIG_RANDOM_KMALLOC_CACHES and CONFIG_SLAB_BUCKETS block naive UAF exploitation, yet they also make my cross-cache attacks completely stable. It looks like these allocator features give an attacker better control over the slab with vulnerable objects and reduce the noise from other objects. Would you agree? It seems that, without a mitigation such as SLAB_VIRTUAL, the Linux kernel remains wide-open to cross-cache attacks. Best regards, Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.