TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

CVE-2014-7284: Lack of randomness in Linux kernel network secrets

99 pointsby mukyuover 10 years ago

4 comments

WestCoastJustinover 10 years ago
&gt; <i>The commit was made in May 2014. It was applied to the Ubuntu trusty kernel tree in June 2014. There was no mention of the security implications of the bug in the commit message, or elsewhere, so far as we can tell.</i><p>Linus did mention his policy on this [1].<p><pre><code> On Tue, 15 Jul 2008, pageexec &lt;at&gt; freemail.hu wrote: &gt; &gt; by &#x27;cover up&#x27; i meant that even when you know better, you quite &gt; consciously do *not* report the security impact of said bugs Yes. Because the only place I consider appropriate is the kernel changelogs, and since those get published with the sources, there is no way I can convince myself that it&#x27;s a good idea to say &quot;Hey script kiddies, try this&quot; unless it&#x27;s already very public indeed. </code></pre> He also talked about this recently at debconf14 [2].<p>[1] <a href="http://thread.gmane.org/gmane.linux.kernel/701694/focus=706947" rel="nofollow">http:&#x2F;&#x2F;thread.gmane.org&#x2F;gmane.linux.kernel&#x2F;701694&#x2F;focus=7069...</a><p>[2] <a href="http://meetings-archive.debian.net/pub/debian-meetings/2014/debconf14/webm/QA_with_Linus_Torvalds.webm" rel="nofollow">http:&#x2F;&#x2F;meetings-archive.debian.net&#x2F;pub&#x2F;debian-meetings&#x2F;2014&#x2F;...</a>
评论 #8402333 未加载
sauereover 10 years ago
That feel when you open up HN and the top post is about some new CVE. Being a sysadmin isn&#x27;t fun these days.
评论 #8401583 未加载
评论 #8401810 未加载
评论 #8401522 未加载
Animatsover 10 years ago
Look at that code change. An incredibly obscure feature of GCC was used to save two machine instruction times in security-critical code. That was either stupid or a deliberate insertion of a security hole.
评论 #8402430 未加载
bartcover 10 years ago
If your system security depends in any way on a randomly initialized TCP sequence number, you&#x27;re asking for trouble.<p>It seems it would be preferable to use predictable values so people don&#x27;t get the impression that random values are somehow more secure.
评论 #8401479 未加载
评论 #8401066 未加载
评论 #8401285 未加载
评论 #8401332 未加载
评论 #8403315 未加载