this post was submitted on 31 May 2024
172 points (100.0% liked)

Linux

1259 readers
103 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS
top 50 comments
sorted by: hot top controversial new old
[–] drwho 75 points 5 months ago (2 children)

Outfits that haven't installed patches since February are getting popped in May by a vuln that was published in January.

[–] jjlinux@lemmy.ml 10 points 5 months ago

Normal technology situations created by normal human behavior. 😜

[–] QuazarOmega@lemy.lol 7 points 5 months ago (4 children)

Outfits? What does it mean in this context?

[–] Waltzy@feddit.uk 16 points 5 months ago (1 children)
[–] QuazarOmega@lemy.lol 5 points 5 months ago

Ahh, thank you

[–] acockworkorange@mander.xyz 5 points 5 months ago

Suits and shit.

load more comments (2 replies)
[–] treadful@lemmy.zip 74 points 5 months ago (2 children)

It's a privilege escalation.

The vulnerability, tracked as CVE-2024-1086 and carrying a severity rating of 7.8 out of a possible 10, allows people who have already gained a foothold inside an affected system to escalate their system privileges. It’s the result of a use-after-free error, a class of vulnerability that occurs in software written in the C and C++ languages when a process continues to access a memory location after it has been freed or deallocated. Use-after-free vulnerabilities can result in remote code or privilege escalation.

[–] corsicanguppy@lemmy.ca 10 points 5 months ago* (last edited 5 months ago) (3 children)

a use-after-free error, a class of vulnerability that occurs in software written in the C and C++ languages when a process continues to access a memory location after it has been freed or deallocated.

Immediately I noticed how when Teslas can't drive themselves we also blame the car and not the driver.

Weak. Blame the driver.

[–] caseyweederman@lemmy.ca 16 points 5 months ago (3 children)
[–] eveninghere 4 points 5 months ago* (last edited 5 months ago)

This guy drives not

load more comments (2 replies)
[–] LeFantome@programming.dev 15 points 5 months ago

I re-wrote my Tesla firmware in Rust. It is faster and more secure. Self-driving is no problem when you use a safe language.

Honestly, why are we even selling cars to people who do not take these basic steps?

load more comments (1 replies)
[–] possiblylinux127@lemmy.zip 4 points 5 months ago

This is why least privilege is so important. If one account is compromised it will be harder to compromise others if the original account is isolated.

[–] stuckgum@lemmy.ml 47 points 5 months ago (6 children)

Yet another security issue that Rust would solve.

[–] veniasilente@lemm.ee 59 points 5 months ago (4 children)

Oh, we heard, Rust is the greatest invention since sliced bread. We heard it already. Like 65534 times.

[–] Zucca@sopuli.xyz 45 points 5 months ago (2 children)

Like 65534 times.

So close to full 16-bit max. So close...

[–] phoenixz@lemmy.ca 11 points 5 months ago

Yeah I figured he was going purposely for a memory overflow

[–] veniasilente@lemm.ee 8 points 5 months ago (1 children)

Yeah we only need 2 brainRusts more to start seeing some fun.

load more comments (1 replies)
[–] urska@lemmy.ca 24 points 5 months ago (4 children)

Aviation, Health, Space and Car industry have only 3 certified languages that they use. Ada, C and C++. Ada is dying because there are way less young engineers who want to invest their future learning it. Then there is C and C++ but they dont offer memory safety and its really hard to master and its really hard and long (thats what she said) to certify the code when being audited for safety by a tier company.

Rust solves by default (no need to review) like 2/3 of the standard requirements those industries have and are that found in C and C++. Rust will soon be approved in this group by the car industry.

Im not a rust fan, but I have 3 things to say about rust.

  • Its fun to program like C++ having the peace of mind knowing the compiler is there helping.
  • You dont feel like youre defusing a bomb like when writing C.
  • Even though its a fun language to write, its also really hard to master, itd say 2 years to be really proficient with it. There is just so much knowledge.
[–] anton@lemmy.blahaj.zone 11 points 5 months ago

Aviation, Health, Space and Car industry have only 3 certified languages that they use. Ada, C and C++.

Rust is automotive certified since over half a year. https://ferrous-systems.com/blog/officially-qualified-ferrocene

[–] corsicanguppy@lemmy.ca 4 points 5 months ago (1 children)
  • You dont feel like youre defusing a bomb like when writing C.

Whoa, Skippy. It's not saving the world, it's just coding properly.

load more comments (1 replies)
[–] caseyweederman@lemmy.ca 4 points 5 months ago (3 children)

Could you explain the "no need to review" part? I do keep hearing good things about Rust.

load more comments (3 replies)
load more comments (1 replies)
[–] drwho 18 points 5 months ago (6 children)

I wonder how many folks are just refusing to use Rust to spite the Rust Evangelism Strike Team.

[–] Templa 11 points 5 months ago

Rustaceans 🤝 Vegans

[–] swab148@startrek.website 4 points 5 months ago (3 children)

I wish there was a synonym for "evangelism" that began with a "u".

load more comments (3 replies)
load more comments (4 replies)
[–] doona@aussie.zone 16 points 5 months ago (1 children)

I hate it when people talk about new technologies 🤬

[–] veniasilente@lemm.ee 11 points 5 months ago (1 children)

Same. We should head back to ICQ!

[–] leopold@lemmy.kde.social 7 points 5 months ago

eh, still beats Discord as far as I'm concerned

[–] corsicanguppy@lemmy.ca 20 points 5 months ago (2 children)

Yet another problem that actually updating your shit - which is trivially easy on enterprise Linux - would fix.

It's part of the 95% of problems solved by actually updating your enterprise Linux host.

[–] delirious_owl@discuss.online 6 points 5 months ago (3 children)

unattended-upgrades and forget about it

load more comments (3 replies)
load more comments (1 replies)
[–] the_doktor@lemmy.zip 9 points 5 months ago (2 children)

Any software can have security issues, including ones written in rust. Just because C/C++ allows one to shoot oneself in the foot doesn't mean it's something that's commonly allowed by anyone with any skill, it's just a bug like anything else. I swear, people advocating rust believe that it's something intrinsic in C/C++ that allows such a thing regardless of what a developer does, and it's getting tiresome.

[–] ProgrammingSocks@pawb.social 7 points 5 months ago

Of course a good developer can avoid these problems for the most part. The point is that we want the bad developers to be forced to do things a safe way by default.

[–] Miaou@jlai.lu 4 points 5 months ago (3 children)

But it is, do you not understand what rust brings compared to these two languages ?

load more comments (3 replies)
[–] GolfNovemberUniform@lemmy.ml 9 points 5 months ago

There are still slight advantages to C that probably will make some devs stick to it in specific cases

[–] possiblylinux127@lemmy.zip 3 points 5 months ago

The problem is bad programmers. You can write good C code but it takes more effort and security checking. You also can write vulnerable and sloppy Rust code.

[–] henfredemars@infosec.pub 3 points 5 months ago (2 children)

I don’t think it’s realistic to expect a rewrite of code that works. Maybe over time we can start implementing pieces in safer languages.

load more comments (2 replies)
[–] bigkahuna1986@lemmy.ml 15 points 5 months ago (1 children)

Is there a way to jailbreak an Android phone using this exploit?

[–] possiblylinux127@lemmy.zip 10 points 5 months ago (1 children)

You could just unlock the bootloader

[–] JCreazy@midwest.social 29 points 5 months ago (1 children)

Assuming the bootloader is unlockable

[–] delirious_owl@discuss.online 4 points 5 months ago (7 children)

You could just buy an android phone that encourages this. All Pixels, for example.

load more comments (7 replies)
[–] applepie@kbin.social 14 points 5 months ago (1 children)

Is this even new?

I thought this already circulated a few months back.

[–] lemmyvore@feddit.nl 19 points 5 months ago (2 children)

Even Debian stable has already patched it.

[–] possiblylinux127@lemmy.zip 11 points 5 months ago* (last edited 5 months ago)

Debian is actually one of the fastest patchers

RHEL on the other hand

[–] caseyweederman@lemmy.ca 4 points 5 months ago

Security patches do the opposite of break stuff

[–] autotldr@lemmings.world 8 points 5 months ago

This is the best summary I could come up with:


It’s the result of a use-after-free error, a class of vulnerability that occurs in software written in the C and C++ languages when a process continues to access a memory location after it has been freed or deallocated.

At the time this Ars post went live, there were no known details about the active exploitation.

A deep-dive write-up of the vulnerability reveals that these exploits provide “a very powerful double-free primitive when the correct code paths are hit.” Double-free vulnerabilities are a subclass of use-after-free errors that occur when the free() function for freeing memory is called more than once for the same location.

The write-up lists multiple ways to exploit the vulnerability, along with code for doing so.

The double-free error is the result of a failure to achieve input sanitization in netfilter verdicts when nf_tables and unprivileged user namespaces are enabled.

Some of the most effective exploitation techniques allow for arbitrary code execution in the kernel and can be fashioned to drop a universal root shell.


The original article contains 351 words, the summary contains 168 words. Saved 52%. I'm a bot and I'm open source!

load more comments
view more: next ›