Linux kernel impacted by new SLUBStick cross-cache attack

Discussion in 'all things UNIX' started by Rasheed187, Aug 24, 2024.

  1. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    Sounds like a pretty major flaw in Linux. So much for Linux being way more secure than Windows. :rolleyes:

    https://www.bleepingcomputer.com/ne...impacted-by-new-slubstick-cross-cache-attack/
     
  2. summerheat

    summerheat Registered Member

    Joined:
    May 16, 2015
    Posts:
    2,244
    Wow, what a mindless comment. All operating systems have been affected by side channel attacks. Judging the security of an OS just from one vulnerability makes no sense at all. Besides, the article mentions:

    ... which makes this issue hardly relevant in the field.
     
  3. longshots

    longshots Registered Member

    Joined:
    Oct 20, 2017
    Posts:
    684
    Location:
    Australia
    Just another example of not bothering to read past the headline.
     
  4. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    From what I understood is that it's indeed not a remote code execution (RCE) bug itself, but it can be combined with a RCE (or app that is run by user themselves locally) to bypass all security defenses in Linux in order to elevate privileges and get full control. So it's very relevant, perhaps not so much on home user systems, but it can make Linux servers way more vulnerable. So seems like a major design flaw in Linux.

    You must not forget that most flaws (privilege escalation) on Windows also can not magically be abused from remote, they always need to be combined with some type of flaw in a third party app (browser, PDF reader) in order to get malware up and running. That's why I have never been infected in the last 20 years of using Windows (and I didn't even patch it most of the time), for one it's easy to block browser exploits on Windows and it's much likelier that you will download some malicious app.
     
  5. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    Actually, here is some more info. So what I meant is, Windows has many design flaws, but this one in Linux is pretty big too.

    And in the second link you can see in the comments that someone else noted that you really don't need physical access in order to abuse this flaw, that's not what is meant with ''you need local access.'' If you can trick someone into running some app exploit, you already have local access.

    Of course you still need to bypass security tools (just like on Windows), but that's why this flaw is so serious, because it makes it easier to do so. So as Linux fanboys I can understand you're trying to downplay this design flaw, but true experts know this is a pretty big one.

    https://linuxsecurity.com/news/security-vulnerabilities/anatomy-of-slubstick-linux-vulnerability

    https://www.tomshardware.com/tech-i...inux-kernel-attack-slips-past-modern-defenses
     
  6. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,100
    Location:
    Canada
    From what I've seen over the years, these doomsday vulnerabilities - for both Linux and Windows - typically and inevitably amount to nothing and fade from memory, because patches will be produced and applied to all affected OS's. Remember the Meltdown and Spectre vulnerabilities from a few years ago that were supposed to be easily weaponized to attack Intel and Arm-based processors? Well they didn't turn out be the doomsday vulnerabilities that they were hyped to be at the time.
     
  7. reasonablePrivacy

    reasonablePrivacy Registered Member

    Joined:
    Oct 7, 2017
    Posts:
    2,222
    Location:
    Member state of European Union
    The only person that think this is doomsday vulnerability is probably Rasheed. Or maybe even him doesn't think that, just pretending to create some drama.

    In other words: this is not a standalone attack. It is sort of force multiplier, when you attack different vulnerability. So the basic thing is as always: keep Linux kernel up to date with all the security fixes. Companies using commercial distributions can do this without additional downtime by using live patching. Recently this was brought up in this thread: https://www.wilderssecurity.com/thr...0-linux-cve-security-bulletins-a-week.454815/

    Another thing is that any person that looked at history of memory management hardening knows this is a cat-mouse game. There will be defense for that developed, then somebody will overcome that defense, rinse and repeat.
     
  8. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    To clarify, I never said that all Linux systems are now doomed. But it's a technical discussion, and from a technical point of view this is a major flaw. Will now all Linux systems be hacked, probably not. That's why I mentioned I have never actually been hacked on Windows in the last 20 years, eventhough from a technical point of view it's one of the most vulnerable operating systems.
     
  9. Stupendous Man

    Stupendous Man Registered Member

    Joined:
    Aug 1, 2010
    Posts:
    3,097
    Location:
    the Netherlands
    For Ubuntu and Ubuntu flavors, Ubuntu Pro, including Livepatch service and Expanded Security Maintenance, is free on up to 5 machines.
    https://ubuntu.com/pro
    https://ubuntu.com/pro/tutorial
     
  10. reasonablePrivacy

    reasonablePrivacy Registered Member

    Joined:
    Oct 7, 2017
    Posts:
    2,222
    Location:
    Member state of European Union
    Ok, so companies and people using commercial Gnu/Linux distros :)
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.