TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Some remotely exploitable Linux kernel WiFi vulnerabilities

348 pointsby gundamdoubleOover 2 years ago

16 comments

boricjover 2 years ago
Can we please stop running network drivers and network stacks in kernel mode by default? It&#x27;s 2022 and we&#x27;ve got more than enough compute power nowadays that the performance hit for running these in user-land is negligible for most use cases. Smartphone, tablet or laptop users usually do not need the level of performance that requires running that stuff in the kernel when browsing the web.<p>I get that there are some use cases where performance really matters to the point where kernel network stack and drivers make a difference (high-throughput and&#x2F;or low-latency services running on servers, high-performance routers...), but that should not be the default for everyone.
评论 #33202442 未加载
评论 #33203812 未加载
评论 #33207967 未加载
评论 #33205907 未加载
评论 #33208789 未加载
评论 #33203046 未加载
评论 #33205049 未加载
评论 #33207745 未加载
评论 #33205041 未加载
评论 #33205468 未加载
评论 #33202301 未加载
评论 #33203563 未加载
评论 #33203164 未加载
评论 #33204689 未加载
评论 #33207529 未加载
nisaover 2 years ago
Could someone more knowledgeable than me comment if this is as worse as it looks?<p>As I understood the issues, this will probably lot&#x27;s of &quot;fun&quot;. You can broadcast the pcap files with any monitor mode capable wifi router. Luckily it&#x27;s 5.1+ so most devices run very old vendor patched kernels and are probably not affected but at least for causing havoc this is really bad. As one issue is using beacon frames just a scan for networks should be enough for a crash. So you can at least crash and maybe exploit any device running recent Linux that scans for wifi networks.<p>I&#x27;m not sure how it&#x27;s possible to do over the air remote code execution but I guess people are working on this.
评论 #33201411 未加载
评论 #33209039 未加载
userbinatorover 2 years ago
Looks like these are all in mac80211. I&#x27;m not 100% familiar with the intimate details of 802.11 but I have read the relevant parts of the standard, at least enough to RE some drivers, and a lot of things were clearly designed to be fixed and of a definite size so as to be implementable on a highly constrained embedded environment, so to see things like use-after-frees appear is a little disappointing.
fsfloverover 2 years ago
Fortunately, on Qubes OS, only the networking VM can be exploited like this, and it will be clean again after its reboot.
评论 #33202923 未加载
评论 #33253127 未加载
tapperover 2 years ago
FYI Fixes are now in openWrt master 21.x and 22.x branches. New bin files will be posted soon. Or you can build from the git.
评论 #33201652 未加载
kramergerover 2 years ago
Stupid question, but how come this has not been embargoed?<p>Seems like a pretty major vulnerability that affects tons of devices.
评论 #33203325 未加载
评论 #33204288 未加载
BluSynover 2 years ago
code diff:<p><a href="https:&#x2F;&#x2F;git.kernel.org&#x2F;pub&#x2F;scm&#x2F;linux&#x2F;kernel&#x2F;git&#x2F;wireless&#x2F;wireless.git&#x2F;commit&#x2F;?h=for-next&amp;id=e7ad651c31c5e1289323e6c680be6e582a593b26" rel="nofollow">https:&#x2F;&#x2F;git.kernel.org&#x2F;pub&#x2F;scm&#x2F;linux&#x2F;kernel&#x2F;git&#x2F;wireless&#x2F;wir...</a>
评论 #33201497 未加载
评论 #33201277 未加载
sva_over 2 years ago
Seems like most of these got introduced in 5.1&#x2F;5.2&#x2F;5.8 and fixed in 5.19.14.
评论 #33206403 未加载
derelictaover 2 years ago
guess its gonna be easier than ever to root one&#x27;s android phone.
评论 #33201734 未加载
Jon_Lowtekover 2 years ago
&gt; <i>The 6.0.2, 5.19.16, 5.15.74, 5.10.148, and 5.4.218 stable kernel updates have all been released. Among other things, these updates contain the fixes for the recently disclosed WiFi vulnerabilities.</i> ~~ LWN.net
christophilusover 2 years ago
Nice. Just in time for a long weekend on public WiFi with my Linux laptop.
WelcomeShortyover 2 years ago
Much better link:<p><a href="https:&#x2F;&#x2F;github.com&#x2F;PurpleVsGreen&#x2F;beacown" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;PurpleVsGreen&#x2F;beacown</a>
评论 #33205205 未加载
wooptooover 2 years ago
&gt; anybody who uses WiFi on untrusted networks<p>So is this for public&#x2F;open Wifi networks only? Or is it for any wireless network where you do not control the gateway?
评论 #33201236 未加载
评论 #33201217 未加载
ByThyGraceover 2 years ago
Hmm does anyone know if there is a site&#x2F;community&#x2F;service that keeps track of backports fixing CVEs for different Linux distros?
xani_over 2 years ago
Eh, it didn&#x27;t get cutesy name like BadWiFi, won&#x27;t be that bad &#x2F;s
评论 #33203157 未加载
hardware2winover 2 years ago
Weekly news of memory related CVE.<p>Keep using unsafe langs.<p>What will be there in next week? CVE in Chromium?<p>At this point betting sites should add category for that kind of games.<p>I do wonder what people of future will think about this:<p>&quot;So they had research indicating that a lot of issues were related to memory, had technology which significantly reduces this issue, but they still kept doin mess for years?&quot;<p><a href="https:&#x2F;&#x2F;msrc-blog.microsoft.com&#x2F;2019&#x2F;07&#x2F;22&#x2F;why-rust-for-safe-systems-programming&#x2F;" rel="nofollow">https:&#x2F;&#x2F;msrc-blog.microsoft.com&#x2F;2019&#x2F;07&#x2F;22&#x2F;why-rust-for-safe...</a><p><a href="https:&#x2F;&#x2F;microsoftedge.github.io&#x2F;edgevr&#x2F;posts&#x2F;Super-Duper-Secure-Mode&#x2F;" rel="nofollow">https:&#x2F;&#x2F;microsoftedge.github.io&#x2F;edgevr&#x2F;posts&#x2F;Super-Duper-Sec...</a><p><a href="https:&#x2F;&#x2F;www.chromium.org&#x2F;Home&#x2F;chromium-security&#x2F;memory-safety&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.chromium.org&#x2F;Home&#x2F;chromium-security&#x2F;memory-safet...</a><p>Memory issues and JIT (browsers) are two things that are responsible for disgusting amount of security issues
评论 #33201564 未加载
评论 #33201863 未加载
评论 #33201568 未加载