This is a SLUBStick news story, published by BleepingComputer, that relates primarily to Linux news.
For more SLUBStick news, you can click here:
more SLUBStick newsFor more Linux news, you can click here:
more Linux newsFor more operating systems news, you can click here:
more operating systems newsFor more news from BleepingComputer, you can click here:
more news from BleepingComputerOtherweb, Inc is a public benefit corporation, dedicated to improving the quality of news people consume. We are non-partisan, junk-free, and ad-free. We use artificial intelligence (AI) to remove junk from your news feed, and allow you to select the best tech news, business news, entertainment news, and much more. If you like this article about operating systems, you might also like this article about
modern kernel defenses. We are dedicated to bringing you the highest-quality news, junk-free and ad-free, about your favorite topics. Please come every day to read the latest limited heap vulnerability news, Kernel Address Space Layout Randomization news, news about operating systems, and other high-quality news about any topic that interests you. We are working hard to create the best news aggregator on the web, and to put you in control of your news feed - whether you choose to read the latest news through our website, our news app, or our daily newsletter - all free!
bypass kernel defensesBleepingComputer
•80% Informative
A novel Linux kernel cross-cache attack named SLUBStick has a 99% success in converting a limited heap vulnerability into an arbitrary memory read-and-write capability.
Researchers from the Graz University of Technology demonstrated the attack on Linux kernel versions 5.9 and 6.2 (latest) using nine existing CVEs in both 32-bit and 64 -bit systems.
The attack worked with all modern kernel defenses like SMEP , SMAP , and KASLR active.
VR Score
75
Informative language
70
Neutral language
68
Article tone
formal
Language
English
Language complexity
74
Offensive language
not offensive
Hate speech
not hateful
Attention-grabbing headline
not detected
Known propaganda techniques
not detected
Time-value
long-living
External references
3
Source diversity
3
Affiliate links
no affiliate links