TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Some remotely exploitable Linux kernel WiFi vulnerabilities

348 点作者 gundamdoubleO超过 2 年前

16 条评论

boricj超过 2 年前
Can we please stop running network drivers and network stacks in kernel mode by default? It&#x27;s 2022 and we&#x27;ve got more than enough compute power nowadays that the performance hit for running these in user-land is negligible for most use cases. Smartphone, tablet or laptop users usually do not need the level of performance that requires running that stuff in the kernel when browsing the web.<p>I get that there are some use cases where performance really matters to the point where kernel network stack and drivers make a difference (high-throughput and&#x2F;or low-latency services running on servers, high-performance routers...), but that should not be the default for everyone.
评论 #33202442 未加载
评论 #33203812 未加载
评论 #33207967 未加载
评论 #33205907 未加载
评论 #33208789 未加载
评论 #33203046 未加载
评论 #33205049 未加载
评论 #33207745 未加载
评论 #33205041 未加载
评论 #33205468 未加载
评论 #33202301 未加载
评论 #33203563 未加载
评论 #33203164 未加载
评论 #33204689 未加载
评论 #33207529 未加载
nisa超过 2 年前
Could someone more knowledgeable than me comment if this is as worse as it looks?<p>As I understood the issues, this will probably lot&#x27;s of &quot;fun&quot;. You can broadcast the pcap files with any monitor mode capable wifi router. Luckily it&#x27;s 5.1+ so most devices run very old vendor patched kernels and are probably not affected but at least for causing havoc this is really bad. As one issue is using beacon frames just a scan for networks should be enough for a crash. So you can at least crash and maybe exploit any device running recent Linux that scans for wifi networks.<p>I&#x27;m not sure how it&#x27;s possible to do over the air remote code execution but I guess people are working on this.
评论 #33201411 未加载
评论 #33209039 未加载
userbinator超过 2 年前
Looks like these are all in mac80211. I&#x27;m not 100% familiar with the intimate details of 802.11 but I have read the relevant parts of the standard, at least enough to RE some drivers, and a lot of things were clearly designed to be fixed and of a definite size so as to be implementable on a highly constrained embedded environment, so to see things like use-after-frees appear is a little disappointing.
fsflover超过 2 年前
Fortunately, on Qubes OS, only the networking VM can be exploited like this, and it will be clean again after its reboot.
评论 #33202923 未加载
评论 #33253127 未加载
tapper超过 2 年前
FYI Fixes are now in openWrt master 21.x and 22.x branches. New bin files will be posted soon. Or you can build from the git.
评论 #33201652 未加载
kramerger超过 2 年前
Stupid question, but how come this has not been embargoed?<p>Seems like a pretty major vulnerability that affects tons of devices.
评论 #33203325 未加载
评论 #33204288 未加载
BluSyn超过 2 年前
code diff:<p><a href="https:&#x2F;&#x2F;git.kernel.org&#x2F;pub&#x2F;scm&#x2F;linux&#x2F;kernel&#x2F;git&#x2F;wireless&#x2F;wireless.git&#x2F;commit&#x2F;?h=for-next&amp;id=e7ad651c31c5e1289323e6c680be6e582a593b26" rel="nofollow">https:&#x2F;&#x2F;git.kernel.org&#x2F;pub&#x2F;scm&#x2F;linux&#x2F;kernel&#x2F;git&#x2F;wireless&#x2F;wir...</a>
评论 #33201497 未加载
评论 #33201277 未加载
sva_超过 2 年前
Seems like most of these got introduced in 5.1&#x2F;5.2&#x2F;5.8 and fixed in 5.19.14.
评论 #33206403 未加载
derelicta超过 2 年前
guess its gonna be easier than ever to root one&#x27;s android phone.
评论 #33201734 未加载
Jon_Lowtek超过 2 年前
&gt; <i>The 6.0.2, 5.19.16, 5.15.74, 5.10.148, and 5.4.218 stable kernel updates have all been released. Among other things, these updates contain the fixes for the recently disclosed WiFi vulnerabilities.</i> ~~ LWN.net
christophilus超过 2 年前
Nice. Just in time for a long weekend on public WiFi with my Linux laptop.
WelcomeShorty超过 2 年前
Much better link:<p><a href="https:&#x2F;&#x2F;github.com&#x2F;PurpleVsGreen&#x2F;beacown" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;PurpleVsGreen&#x2F;beacown</a>
评论 #33205205 未加载
wooptoo超过 2 年前
&gt; anybody who uses WiFi on untrusted networks<p>So is this for public&#x2F;open Wifi networks only? Or is it for any wireless network where you do not control the gateway?
评论 #33201236 未加载
评论 #33201217 未加载
ByThyGrace超过 2 年前
Hmm does anyone know if there is a site&#x2F;community&#x2F;service that keeps track of backports fixing CVEs for different Linux distros?
xani_超过 2 年前
Eh, it didn&#x27;t get cutesy name like BadWiFi, won&#x27;t be that bad &#x2F;s
评论 #33203157 未加载
hardware2win超过 2 年前
Weekly news of memory related CVE.<p>Keep using unsafe langs.<p>What will be there in next week? CVE in Chromium?<p>At this point betting sites should add category for that kind of games.<p>I do wonder what people of future will think about this:<p>&quot;So they had research indicating that a lot of issues were related to memory, had technology which significantly reduces this issue, but they still kept doin mess for years?&quot;<p><a href="https:&#x2F;&#x2F;msrc-blog.microsoft.com&#x2F;2019&#x2F;07&#x2F;22&#x2F;why-rust-for-safe-systems-programming&#x2F;" rel="nofollow">https:&#x2F;&#x2F;msrc-blog.microsoft.com&#x2F;2019&#x2F;07&#x2F;22&#x2F;why-rust-for-safe...</a><p><a href="https:&#x2F;&#x2F;microsoftedge.github.io&#x2F;edgevr&#x2F;posts&#x2F;Super-Duper-Secure-Mode&#x2F;" rel="nofollow">https:&#x2F;&#x2F;microsoftedge.github.io&#x2F;edgevr&#x2F;posts&#x2F;Super-Duper-Sec...</a><p><a href="https:&#x2F;&#x2F;www.chromium.org&#x2F;Home&#x2F;chromium-security&#x2F;memory-safety&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.chromium.org&#x2F;Home&#x2F;chromium-security&#x2F;memory-safet...</a><p>Memory issues and JIT (browsers) are two things that are responsible for disgusting amount of security issues
评论 #33201564 未加载
评论 #33201863 未加载
评论 #33201568 未加载