SLUB Internals for Exploit Developers - Andrey Konovalov, xairy.io
SLUB Internals for Exploit Developers - Andrey Konovalov, xairy.io
Every Linux kernel exploit that targets a slab memory corruption bug has to shape slab memory in a certain way to control which memory gets corrupted. For example, make the kernel put a specific slab object next to a buffer that can be overflown. Or replace a freed object with another one to overwrite it later via a use-after-free reference. Implementing different slab-shaping strategies requires a deep understanding of the SLUB allocator. This talk will cover the core SLUB allocator internals and explain how and why common slab memory shaping strategies work in Linux kernel exploits.
Every Linux kernel exploit that targets a slab memory corruption bug has to shape slab memory in a certain way to control which memory gets corrupted. For example, make the kernel put a specific slab object next to a buffer that can be overflown. Or replace a freed object with another one to overwrite it later via a use-after-free reference. Implementing different slab-shaping strategies requires a deep understanding of the SLUB allocator. This talk will cover the core SLUB allocator internals and explain how and why common slab memory shaping strategies work in Linux kernel exploits.
The Linux Foundation
The Linux Foundation is a nonprofit consortium dedicated to fostering the growth of Linux and collaborative software development. Founded in 2000, the organization sponsors the work of Linux creator Linus Torvalds and promotes, protects and advances the L...