HEXACON2024 – Cross-CPU Allocation to Exploit Preempt-Disabled Linux Kernel by Mingi Cho & Wongi Lee

The video discusses utilizing cross CPU allocation to exploit Linux kernel vulnerabilities, specifically focusing on two exploits related to NF tables and the traffic control subsystem. The speakers, identified as vulnerability researchers, explain their processes and techniques for identifying and exploiting these vulnerabilities, along with the significance of the Conor step program.

Key Points:

  • Introduction of the speakers as vulnerability researchers involved in the Linux kernel and bug bounty programs.
  • Overview of the Conor step vulnerability reward program and its focus on Linux kernel exploits.
  • Explanation of two specific vulnerabilities: one in NF tables and the other in the traffic control subsystem.
  • Discussion of the exploitation methods using cross CPU allocation related to both the slab and body allocators.
  • Detailed description of the NF tables vulnerability, its lookup functions, and the steps taken to exploit it.
  • Introduction to cross CPU allocation and its relevance in the exploitation process.
  • Insights into traffic control subsystem vulnerabilities and the issues arising from code modifications.
  • Explanation of mitigation measures in the Linux kernel and how certain strategies bypass those mitigations.
  • Conclusion highlighting the effectiveness of cross CPU allocation in exploiting kernel vulnerabilities and potential future implications for security.
  • Invitation for further questions or contact for those interested in the topic.

  • Youtube Video: https://www.youtube.com/watch?v=dUdU0lp35xU
    Youtube Channel: Hexacon
    Video Published: 2024-11-08T09:53:41+00:00