TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

CVE-2022-0435: A Remote Stack Overflow in the Linux Kernel

115 pointsby caaqilover 3 years ago

10 comments

paulmdover 3 years ago
Quick reminder that KASLR is broken by &quot;metadata leakage&quot; (the metadata is the page table mappings) on AMD processors by default unless you manually enable KPTI.<p>This was discovered by the same team that discovered Spectre and Meltdown and the official AMD stance is WONTFIX because it can be mitigated by enabling KPTI, however they also refuse to state that KPTI should be enabled by default on their processors because that would tank their benchmarks.<p>They don&#x27;t put it in quite those exact words in the bulletin, but the &quot;user and kernel address space boundary&quot; they are referring to that the exploit cannot cross is KPTI. Turn it on and it&#x27;s mitigated, if it&#x27;s off kernel pages and user pages live in the same tables and are thus vulnerable. However AMD&#x27;s official stance is KPTI off-by-default, so generally they are still vulnerable unless you manually enable KPTI.<p>(their ass is covered by the &quot;obey good security practices&quot;, i.e. if you actually care you should be turning it on because it&#x27;s a good security practice in general, but it would nuke their benchmarks just like it did to Intel, so they want it off by default since that&#x27;s how things are usually benchmarked.)<p>The paper describes several approaches, some of which can be mitigated (the time and power measurement attacks) and some of which cannot except via KPTI (TLB-Evict+Prefetch). The issue is, broadly speaking, unfixed. And actually I think at this point it&#x27;s past metadata leakage and actually just leaking data considering Lipp has extracted actual memory from the kernel.<p><a href="https:&#x2F;&#x2F;mlq.me&#x2F;download&#x2F;amdprefetch.pdf" rel="nofollow">https:&#x2F;&#x2F;mlq.me&#x2F;download&#x2F;amdprefetch.pdf</a><p><a href="https:&#x2F;&#x2F;www.amd.com&#x2F;en&#x2F;corporate&#x2F;product-security&#x2F;bulletin&#x2F;amd-sb-1017" rel="nofollow">https:&#x2F;&#x2F;www.amd.com&#x2F;en&#x2F;corporate&#x2F;product-security&#x2F;bulletin&#x2F;a...</a>
评论 #30309824 未加载
评论 #30330803 未加载
LinuxBenderover 3 years ago
TIPC is one of the many modules that are suggested to be disabled in CIS and NIST hardening documentation unless you have an explicit requirement for it. [1] And here [2] is a previous discussion from 2017 discussing disabling kernel modules. As imrejonk mentioned this is not loaded by default.<p>One can check the loaded modules with<p><pre><code> lsmod </code></pre> The module can be explicitly disabled with<p><pre><code> # cat &#x2F;etc&#x2F;modprobe.d&#x2F;tipc.conf install tipc &#x2F;bin&#x2F;false </code></pre> There are documents explaining the pros and cons to using &#x2F;bin&#x2F;false vs &#x2F;bin&#x2F;true for disabling modules.<p>[1] - <a href="https:&#x2F;&#x2F;downloads.cisecurity.org&#x2F;#&#x2F;" rel="nofollow">https:&#x2F;&#x2F;downloads.cisecurity.org&#x2F;#&#x2F;</a><p>[2] - <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=13709591" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=13709591</a>
mindcrimeover 3 years ago
Huh. I&#x27;d never heard of TIPC before now either, but this actually sounds pretty interesting now that I&#x27;m reading about it. Shame that this was my first introduction to it (and from reading these threads, it seems like I&#x27;m not the only one).<p><a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Transparent_Inter-process_Communication" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Transparent_Inter-process_Comm...</a>
jeroenhdover 3 years ago
Posted yesterday, but with no comments: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=30291958" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=30291958</a><p>A bug of similar severity was fixed a few months ago: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=29117815" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=29117815</a><p>Luckily, it looks like most distros don&#x27;t load this module by default.
评论 #30306787 未加载
userbinatorover 3 years ago
<i>The vulnerability has been present since the introduction of the TIPC monitoring framework in kernel version 4.8.</i><p>I guess this is another one of those times when newer isn&#x27;t always better... especially when it comes with extra stuff you never needed anyway. At least this one doesn&#x27;t seem to be enabled by default.
dborehamover 3 years ago
Surprised and slightly worried that there has been a whole protocol out there since 1996 that I never heard of until now.
评论 #30304865 未加载
评论 #30306765 未加载
tragictrashover 3 years ago
I don&#x27;t think this should be a surprise for anyone at this point. All of our systems have critical vulnerabilities that haven&#x27;t been discovered yet. Welcome to 2022.<p>If you think quantum breaking cryptography is bad, wait until they figure out how to use it for fuzzing.
评论 #30306047 未加载
评论 #30305242 未加载
评论 #30305493 未加载
fulafelover 3 years ago
Any ideas why this service is in the kernel? <a href="https:&#x2F;&#x2F;www.kernel.org&#x2F;doc&#x2F;html&#x2F;latest&#x2F;networking&#x2F;tipc.html" rel="nofollow">https:&#x2F;&#x2F;www.kernel.org&#x2F;doc&#x2F;html&#x2F;latest&#x2F;networking&#x2F;tipc.html</a> doesn&#x27;t seem to give provide the motivation.
评论 #30305818 未加载
notyourdayover 3 years ago
Why are you running sexy protocols when non-sexy protocols do the job?
traszover 3 years ago
Yay, yet another vulnerability that wouldn&#x27;t happen if running on CHERI&#x2F;Morello hardware.
评论 #30305192 未加载