Linux kernel bug opens door to all manner of attacks
A patch for the vulnerability has already been merged in the mainline kernel
Security researchers have discovered an information disclosure vulnerability in the Linux kernel that can be exploited to leak data, at least on 32-bit Arm devices.
Disclosed by experts at Cisco Talos, the bug, tracked as CVE-2020-28588, could allow an attacker to view the contents of the kernel stack memory and can also be used as a springboard for further compromise.
The Cisco researchers first discovered this issue on an Azure Sphere device version 20.10, which is a 32-bit Arm device that runs a patched Linux kernel.
We're looking at how our readers use VPN for a forthcoming in-depth report. We'd love to hear your thoughts in the survey below. It won't take more than 60 seconds of your time.
- Here are the best Linux laptops for running Linux
- And, these are the best laptops for programming
- Also check our collection of the best Linux distros for business
The good news however is that the security researchers worked with the kernel developers to mitigate the bug, and a patch has been added to the mainline Linux kernel and backported to currently supported Long Term Support (LTS) releases as well.
Information disclosure
Sharing details about the vulnerability the researchers observe that the issue was introduced in kernel v5.1-rc4 and was present till v5.10-rc4, before it was patched.
According to their analysis the weakness in the kernel could’ve been exploited by a threat actor by reading the contents of the /proc/<pid>/syscall system file.
“If utilized correctly, an attacker could leverage this information leak to successfully exploit additional unpatched Linux vulnerabilities,” write the researchers.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
In the post they describe how the attackers can abuse the proc pseudo-file system to bypass the Kernel Address Space Layout Randomization (KASLR).
The patch was merged in the kernel in December 2020 and should no longer pose a threat to anyone who applies security updates without fail.
- Subscribe to Linux Format magazine for more Linux and open source goodness
Via ZDNet
With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.