Linux Kernel
Overwriting modprobe_path technique
Conditions:
Known address of modprobe\_path (unaffected by FG-KASLR)
Known address of kpti\_trampoline (unaffected by FG-KASLR)
Arbitrary Write
We can write to modprobe_path the path of our own shellscript and then execute a file with unknown signature to trigger it. This technique bypasses SMEP/SMAP.
References:
Bypass CONFIG_SLAB_FREELIST_HARDENED
Target pointer is xored with the address of the pointer and a random value. This random value is unique per slab.
Last updated