Jump to content

SLUBStick

From Wikipedia, the free encyclopedia

This is the current revision of this page, as edited by JL-Bot (talk | contribs) at 08:21, 17 November 2024 (removing orphan template as not a valid orphan). The present address (URL) is a permanent link to this version.

(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)

SLUBStick is a Linux kernel exploit technique. It can allow an attacker to elevate a limited heap vulnerability to an arbitrary memory read/write access. This can be leveraged for privilege escalation and container escapes, even with modern defences enabled.[1]

Discovery

[edit]

SLUBStick was discovered by Lukas Maar, Stefan Gast, Martin Unterguggenberger, Mathias Oberhuber, and Stefan Mangard, Graz University of Technology, and first presented at USENIX 2024 symposium.[2]

Vulnerable platforms

[edit]

The technique is demonstrated on Linux kernel versions 5.19 and 6.2 on the x86_64 and x86 platform, but is assumed to be possible in all Linux versions on those platforms. Also Linux kernels running on virtual machines on those platforms are considered vulnerable.[citation needed]

Further reading

[edit]

References

[edit]
  1. ^ Bill Toulas (3 August 2024). "Linux kernel impacted by new SLUBStick cross-cache attack". Bleepingcomputer.
  2. ^ Lukas Maar, Stefan Gast, Martin Unterguggenberger, Mathias Oberhuber, and Stefan Mangard (16 August 2024). "SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel". USENIX.{{cite web}}: CS1 maint: multiple names: authors list (link)