Linux kernel vulnerability exposes Stack memory, causing local data leak
First announced by researchers from cybersecurity organization Cisco Talos on April 27, this is essentially a disclosure vulnerability "that could allow attackers to gain access. Kernel's stack memory - a crucial component of Linux 'open source operating systems.
Linux kernel vulnerability exposes Stack memory, causing local data leak Picture 1
If you do not know, the stack memory acts as a storage place for local variables in functions, passed parameters . The process of accessing this memory is very fast, and is executed when the program translate. The size of the stack memory is fixed, depending on the particular operating system. For example, the usual stack memory of Windows is 1MB, while that of Linux is 8MB.
The vulnerability is currently being tracked with identifier CVE-2020-28588, and originated from the proc / pid / syscall function of 32-bit ARM devices running the Linux operating system in general.
According to the results of preliminary investigations by Cisco Talos experts, the first issue related to this vulnerability was discovered on a device running on Azure Sphere. Attackers who have sought to exploit the security vulnerability could read the file / syscall OS through Proc, a system used to communicate between nuclear data structures.
The / syscall procfs item can be abused if an attacker launches a command to output 24 bytes in the uninitialized stack memory, resulting in Kernel Address Space Layout Randomization (KASLR) bypassing.
The attack was "undetectable on the remote network" because it was essentially a legitimate Linux OS file being read, the researchers said.
"If used properly, an attacker can take advantage of this information leak to successfully exploit additional unpatched Linux vulnerabilities," the Cisco team added.
Linux kernel versions 5.10-rc4, 5.4.66, and 5.9.8 are directly affected by this vulnerability. Currently, a patch has been released to minimize the risks associated with the vulnerability. It is recommended that users update their builds to the latest version to ensure safety.
You should read it
- This is a way to protect Linux Mint from Meltdown and Specter
- Google blacklisted some web browsers on Linux, blocking access to Google services
- 20+ essential Linux security commands
- Found 37 security holes in VNC on Linux, Windows
- How to manage memory to restrict Linux to use too much RAM
- Microsoft officially submitted an application to join 'Linux secretion'.
- How to scan websites for potential security vulnerabilities with Vega on Kali Linux
- How to secure Linux server with fail2ban
- 10 reasons to switch to Linux right in 2012
- Detect 2 serious security holes in the Zoom application
- 5 ways to improve Linux user account security
- Learn about the Backtrack operating system
May be interested
Microsoft expert discovered a series of serious code execution errors in IoT, OT devices
New Internet threats are quietly taking place
Update your Macbook now to avoid this major security bug
Hundreds of networks were accessed illegally when Codecov was attacked on a large scale
Warning campaign of large-scale ransomware attack, misuse of 7zip to encrypt QNAP devices
Has the time of targeted ransomware arrived?