The presentation discusses a new exploit technique called Explains that can exploit a previously unexploitable lace condition vulnerability found in the Linux kernel. The technique utilizes hardware's basic interrupt mechanism and is generally applicable regardless of corner configuration or specific situation.
- Explains is a new exploit technique that can exploit a previously unexploitable lace condition vulnerability found in the Linux kernel
- The vulnerability occurs if instruction A is executed before instruction B and instruction C is executed before instruction D
- The non-inclusive lace condition makes it difficult to exploit the vulnerability using normal bursting
- Explains solves the problem of non-inclusive lace condition and the lack of time to relocate
- The technique utilizes hardware's basic interrupt mechanism and is generally applicable regardless of corner configuration or specific situation
The presentation demonstrates how the Explains technique can be used to exploit the vulnerability and gain loot permission by triggering the vulnerability, leaking the file pointer and credit pointer of the current process, and overwriting zero to the UID variable. The technique extends the time window by at least 15,000 cycles due to exp laces, allowing for the vulnerability to modify memory that should not be modified.