Lots of new stable kernels
Posted Feb 23, 2024 16:06 UTC (Fri)
by danielthompson (subscriber, #97243)
[Link] (10 responses)
Posted Feb 23, 2024 16:18 UTC (Fri)
by wtarreau (subscriber, #51152)
[Link] (9 responses)
Posted Feb 23, 2024 18:00 UTC (Fri)
by iabervon (subscriber, #722)
[Link]
It would take additional effort to determine possible impacts or mitigating factors or severity, since they want to fix even bugs with the impact "authorized users could cause system corruption by doing an operation that should be safely rejected", so the reports are announced without any of that.
Posted Feb 25, 2024 0:15 UTC (Sun)
by pbonzini (subscriber, #60935)
[Link] (4 responses)
Several of the CVE reports also are off pretty bad quality, due to bugs in scripts that cannot handle multi-commit fixes or renamed files.
Posted Feb 25, 2024 20:10 UTC (Sun)
by roc (subscriber, #30627)
[Link] (3 responses)
To some extent this CVE flow is just reflecting "yes, the Linux kernel is a security disaster".
Posted Feb 26, 2024 0:09 UTC (Mon)
by geofft (subscriber, #59789)
[Link]
But apparently recent kernels panic after 10000 oopses (https://lore.kernel.org/all/20221107201317.324457-1-jannh...), so just running the null pointer dereference ten thousand times is a DoS. And the reason for this is that "harmless" null pointer dereferences commonly increment a counter such as a reference count or the number of holders of a read lock, and if that counter overflows to zero, then an exploit becomes possible. Which seems like a fair argument to me.
At my day job where I'm a sysadmin and an incident responder, I would absolutely count a DoS that takes down an entire running kernel as a security issue: if our systems shut down, we're definitely failing to make money, we might be unable to cancel orders or otherwise communicate with others to get us out of a position where we're losing money, and we're probably breaking contractual commitments to our customers. It's certainly not the highest risk - specially since, if you're at the point where you can attack our kernels, you probably have a form of userspace access we should already be deeply concerned about - but it's definitely on the list somewhere. Hurricanes and pandemics are also "only" DoSes to our business but we still made extensive plans to keep things running through those.
---
I think I see one obviously invalid CVE on this list, CVE-2023-52472: "Static checkers insist that the mpi_alloc() allocation can fail so add a check to prevent a NULL dereference. Small allocations like this can't actually fail in current kernels, but adding a check is very simple and makes the static checkers happy." (The only argument I can see is that it might fail in a downstream kernel that changes how memory allocation works, but if you're going to count the theoretical possibility of downstreams changing things, the entirety of your unchanged code is already a vulnerability.)
Everything else looks like an actual vulnerability with nonzero (though perhaps low) impact - including one that I clicked on because it didn't sound like a vulnerability at all from a subject line but turns out to be reported by the Zero Day Initiative.
Posted Feb 26, 2024 17:36 UTC (Mon)
by pawel44 (guest, #162008)
[Link] (1 responses)
Nope, it just shows they care about security. You can't forget about it when comes to Windows or FreeBSD. They're [in]security disasters.
Posted Feb 26, 2024 19:11 UTC (Mon)
by roc (subscriber, #30627)
[Link]
Posted Feb 27, 2024 11:58 UTC (Tue)
by bluca (subscriber, #118303)
[Link] (2 responses)
Posted Feb 27, 2024 19:51 UTC (Tue)
by roc (subscriber, #30627)
[Link] (1 responses)
Posted Feb 27, 2024 20:44 UTC (Tue)
by rahulsundaram (subscriber, #21946)
[Link]
That may very well be the case but the process here appears to be about scoring political points by overwhelming the CVE process with a lot of filings and then point at it and say see, this is broken instead of an introspective effort to actually address security disclosure issues that the kernel has long suffered from.
Lots of new stable kernels
https://lore.kernel.org/linux-cve-announce/
Lots of new stable kernels
Lots of new stable kernels
Lots of new stable kernels
Lots of new stable kernels
Lots of new stable kernels
Lots of new stable kernels
Lots of new stable kernels
Lots of new stable kernels
Lots of new stable kernels
Lots of new stable kernels
