This vulnerability, hidden within the netfilter: nf_tables component, allows local attackers to escalate their privileges and potentially deploy ransomware, which could severely disrupt enterprise systems worldwide.

  • turdas@suppo.fi
    link
    fedilink
    English
    arrow-up
    92
    arrow-down
    3
    ·
    12 天前

    This only affects positively ancient kernels:

    From (including) 3.15 Up to (excluding) 5.15.149 From (including) 6.1 Up to (excluding) 6.1.76 From (including) 6.2 Up to (excluding) 6.6.15 From (including) 6.7 Up to (excluding) 6.7.3

  • Treczoks@lemmy.world
    link
    fedilink
    English
    arrow-up
    30
    arrow-down
    1
    ·
    12 天前

    For exploiting a privilege escalation the attacker must be able to run their own code on your machine. If you let them do such things, you already have more than enough security problems in the first place.

    • okamiueru@lemmy.world
      link
      fedilink
      English
      arrow-up
      13
      ·
      12 天前

      Except for supply chain attacks. You get a foot in the door, and open the rest with impunity

      • Treczoks@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        1
        ·
        11 天前

        Yes, but still a privilege elevation bug is still less risky than a remote execution one.

        • JackbyDev@programming.dev
          link
          fedilink
          English
          arrow-up
          4
          ·
          11 天前

          They’re replying to the victim blaming mentality of “if you let them then you have bigger problems” in your comment. Not your point about it being less dangerous than remote execution.

    • henfredemars@infosec.pub
      link
      fedilink
      English
      arrow-up
      25
      ·
      12 天前

      You need to be able to run code on the system that has the bug. The bug is in the netfilter component, in how it’s managed on that system, not in the actual traffic flows.

      • BCsven@lemmy.ca
        link
        fedilink
        English
        arrow-up
        11
        arrow-down
        3
        ·
        12 天前

        So a non issue unless somebody has physical access to the machine?

        • who@feddit.org
          link
          fedilink
          English
          arrow-up
          22
          ·
          edit-2
          12 天前

          Unfortunately, it’s not that simple, because attacks often involve “exploit chains”. In this case, an attacker would use a different vulnerability to gain code execution capability, and then use that capability to exploit this vulnerability.

          Update your systems, folks.

        • henfredemars@infosec.pub
          link
          fedilink
          English
          arrow-up
          1
          ·
          12 天前

          Not directly, but as other comment has mentioned, it reduces the overall security posture because it could be combined with other flaws known and unknown.

    • onlinepersona@programming.dev
      link
      fedilink
      English
      arrow-up
      25
      arrow-down
      4
      ·
      12 天前

      But… You dont understand, Rust is the devil! If Rust were made the kernel’s main language it would terrible because that would mean change 😭😭😭

    • Zangoose@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      ·
      12 天前

      But then the kernel wouldn’t be free! Free as in ‘use-after-free’!

      (/s in case it wasn’t obvious)

    • Shanmugha@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      arrow-down
      3
      ·
      edit-2
      12 天前

      Magical pills do not exist. Better start pushing old fuckers incapable of learning out of the project (yeah, I don’t like this kind of treatment of Rust just because it is not C either)

      • Quazatron@lemmy.world
        link
        fedilink
        English
        arrow-up
        22
        arrow-down
        1
        ·
        12 天前

        Old fuckers exist to protect young fuckers from throwing out the baby with the bath water.

        • Quazatron@lemmy.world
          link
          fedilink
          English
          arrow-up
          7
          ·
          12 天前

          I’m referring to the ageism implied in the statement, I don’t care about C vs Rust any more than I care about vi vs emacs or KDE vs Gnome.

          Old fuckers have experience, they have seen many next big things come and go, that’s why they seem slow to adopt new stuff. Of course this annoys new fuckers a lot, as they want to play with their new shiny toys now.

          Patience is a virtue, young grasshopper.

        • Shanmugha@lemmy.world
          link
          fedilink
          English
          arrow-up
          5
          arrow-down
          1
          ·
          12 天前

          Ooh, so “get out with this Rust, I ain’t gonna think about when writing my code” is protecting a baby now?

    • ZILtoid1991@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      2
      ·
      12 天前

      Okay, then why we need to use a language that has more in common with OCaml? What about using a better C instead?

    • corsicanguppy@lemmy.ca
      link
      fedilink
      English
      arrow-up
      13
      arrow-down
      14
      ·
      12 天前

      Yay! Pick an arbitrary solution to a problem just because it’s different and shiny! The shine will fix it!

      • dragonfly4933@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        29
        ·
        12 天前

        Explain how a use after free could occur in safe rust, because to my knowledge, that is exactly the kind of thing rust does protect against.

      • Zangoose@lemmy.world
        link
        fedilink
        English
        arrow-up
        5
        ·
        12 天前

        Do you know what a use-after-free bug is? Rust was literally designed to make this type of memory bug impossible.

      • Noja@sopuli.xyz
        link
        fedilink
        English
        arrow-up
        5
        arrow-down
        1
        ·
        12 天前

        You never say “would not of”. It’s “would not have”.

        Rust would have prevented this, because the borrow checker prevents use-after-free vulnerabilites.

        • henfredemars@infosec.pub
          link
          fedilink
          English
          arrow-up
          8
          arrow-down
          1
          ·
          12 天前

          Yes, that’s right. You cannot have a UAF situation unless you’re using unsafe “escape hatch” tools.

            • calcopiritus@lemmy.world
              link
              fedilink
              English
              arrow-up
              2
              ·
              11 天前

              I’ve only seen it once. And it was made specifically to trigger a compiler bug. It barely looked like rust code.

              Now tell me how someone will introduce such a bug by accident. Winning the lottery 10000 times in a row with the same number isn’t impossible either. But we are engineers, not pure math pedantics. 0.000000000000001% probability for something that happens with less frequency than once per second is impossible.

            • turdas@suppo.fi
              link
              fedilink
              English
              arrow-up
              2
              ·
              12 天前

              It’s not a joke. What was described above is pretty much C++'s RAII pattern, which Rust evangelists love to present as a revolutionary Rust invention. Used with smart pointers, it will help avoid use-after-frees. What it doesn’t avoid is null pointer exceptions (you can std::move a unique_ptr and still access it, it’ll just be nullptr), but those will typically “just” be a crash rather than a gaping security hole.

              That is not to say Rust doesn’t have its own innovations on top of that (notably that the compiler stringently enforces this pattern), and C++ does give you many more ways to break the rules and shoot yourself in the foot than Rust does.

              • sp3ctr4l@lemmy.dbzer0.com
                link
                fedilink
                English
                arrow-up
                4
                ·
                12 天前

                Your second half there is the whole point.

                Being memory unsafe in C++ is can occur by accident.

                Being memory unsafe in Rust… essentiallly requires consistent intent.

                When coming up with guidelines for an emgineering procesd that can go catastrophically wrong… do you use a stricter ruleset, or a less strict one?

                That’s basically the safety argument.

                • turdas@suppo.fi
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  arrow-down
                  1
                  ·
                  12 天前

                  If you follow modern C++ best practices, memory unsafety will not happen by accident. The dodgy stuff in modern, idiomatic C++ is immediately obvious.

            • henfredemars@infosec.pub
              link
              fedilink
              English
              arrow-up
              1
              ·
              12 天前

              I think the idea is that it’s easier to manage your resources in C++ if you write your code using RAII. Linux is mainly C, not C++, which makes resource management a little bit more manual.

              Rust however categorically tries to stop these problems from happening in an even stronger way. You can still write bad code in any language, but it’s supposed to be a lot more difficult to get memory corruption.

          • dragonfly4933@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            7
            ·
            12 天前

            This is correct, but not what most people think. For example, memory leaks could be considered bugs and it is easy to leak memory memory in safe rust on purpose.

            Memory leaks are usually not disastrous for security, mostly an issue for availability, sometimes.

            • Zangoose@lemmy.world
              link
              fedilink
              English
              arrow-up
              2
              ·
              12 天前

              I think a lot of the confusion comes from the ambiguity of the phrase “memory leak.” Rust is designed around preventing insecure memory access (accessing out of bounds for an array, use-after-free, etc.) and devs call that a memory leak. But another form of memory leak is just not freeing up memory when its no longer needed (e.g. continuously pushing a bunch of things to a global vector and never clearing it). That is more of a fundamental program design issue that rust can’t do anything about. (and really, neither could any turing complete language)

        • just_another_person@lemmy.world
          link
          fedilink
          English
          arrow-up
          3
          arrow-down
          8
          ·
          edit-2
          12 天前

          Improbable. Everything has bugs that surface. See my other link, or look yourself. There have been plenty of security fixes for Rust. It’s not bulletproof, just like anything else, just less likely specifically for certain memory attacks to be vectors.

          • arcterus@piefed.blahaj.zone
            link
            fedilink
            English
            arrow-up
            11
            arrow-down
            2
            ·
            edit-2
            12 天前

            Everything has bugs that surface.

            This is a worthless statement. Rust is designed to help reduce the number of bugs. No one thinks Rust will completely eliminate all bugs. Your argument about fixes in the compiler or standard library or whatever applies to C as well.

            See my other link, or look yourself.

            The link you posted says nothing about Rust software having bugs, it’s about malware written in Rust exploiting bugs in other software.

        • AMoistGrandpa@lemmy.ca
          link
          fedilink
          English
          arrow-up
          5
          ·
          12 天前

          Rust is a programming language which was designed to be memory safe without any of the overhead caused by traditional memory safety techniques employed by existing languages (namely, garbage collection and reference counting). It does this by shifting the memory management from happening at runtime to happening at compile time. The compiler forces the programmer to follow certain rules to ensure that their program can be proven to be free of errors such as use-after-frees and double-frees. Because of this design philosophy, Rust is a good fit as a replacement for C, because it can do everything that C can while ensuring the programmer doesn’t make any mistakes with regard to memory management.

  • ScoffingLizard@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    5
    ·
    10 天前

    I read: Microsoft started to feel threatened and paid black hats to exploit vulnerabilities in wares that people have recently learned are far superior to their goddamned surveillance garbage.