From mboxrd@z Thu Jan 1 00:00:00 1970 MIME-Version: 1.0 References: In-Reply-To: From: Kees Cook Date: Wed, 20 Feb 2019 17:17:07 -0800 Message-ID: Subject: Re: classes of methods for gaining access to kernel memory Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable To: Carter Cheng Cc: Kernel Hardening List-ID: On Sun, Feb 10, 2019 at 3:13 AM Carter Cheng wrote: > I was reading a paper on kernel data attacks and the paper mentions metho= ds for gaining control of kernel memory beyond overflow type attacks. This = would seem to suggest that methods exist for this in certain cases beyond w= hat can be caught by spatial safety checks. Are there general classes of su= ch methods that one needs to be aware of? And what are they? If I follow what you're asking, I'd think race conditions would be an example of another major class of attacks against the kernel. For example, look at the DirtyCOW attack: that was a race condition against the kernel's VFS that wouldn't get caught by bounds checking, etc, etc. --=20 Kees Cook