Hírolvasó
The Open Enterprise Linux Association
Starting later this year, OpenELA will provide sources necessary for downstreams compatible with RHEL to exist, with initial focus on RHEL versions EL8, EL9 and possibly EL7. The project is committed to ensuring the continued availability of OpenELA sources to the community indefinitely.
OpenELA’s core tenets, reflecting the spirit of the project, include full compliance with this existing standard, swift updates and secure fixes, transparency, community, and ensuring the resource remains free and redistributable for all.
[$] An ioctl() call to detect memory writes
OpenSSH 9.4 released
Security updates for Thursday
EPAM beágyazott Linux fejlesztőt keres C/C++ tapasztalattal
OpenSSH 9.4 released!
The complete release notes may be read here: https://www.openssh.com/releasenotes.html#9.4p1
Máris elkésett az EU a kvantum-háborúban?
A vállalatoknak és a kormányoknak gyorsan kell cselekedniük, hogy átfogó stratégiát dolgozzanak ki a kvantumkészségre vonatkozóan ─ áll a European Policy Center új jelentésében.
The post Máris elkésett az EU a kvantum-háborúban? first appeared on Nemzeti Kibervédelmi Intézet.
Újabb rosszindulatú csomagokat találtak az NPM-ben
Borítókép forrása: Wikipédia/saját szerkesztés A Phylum kutatói 2023. július 31-én tíz különböző “tesztcsomag” közzétételét figyelték meg az NPM csomagkezelőben, amelyeket érzékeny fejlesztői forráskódok és bizalmas információk kiszivárogtatására fejlesztettek ki. Mindegyik csomagot ugyanaz az a felhasználó, malikrukd4732 tette közzé, és három fájlt tartalmazott. A modulok JavaScriptet indítanak (“index.js“), amely az információk távoli szerverre történő feltöltéséhez szükséges […]
The post Újabb rosszindulatú csomagokat találtak az NPM-ben first appeared on Nemzeti Kibervédelmi Intézet.
[$] LWN.net Weekly Edition for August 10, 2023
[$] CPython without a global interpreter lock
Linux Plumbers Conference: Kernel Testing & Dependability MC CFP
Once again The Kernel Testing & Dependability Micro-conference will be taking place at LPC 2023, to discuss testing and dependability related topics.
Please submit proposals for discussion via LPC submission system.
The Linux Plumbers 2023 Kernel Testing & Dependability track focuses on advancing the current state of testing of the Linux Kernel and its related infrastructure. The main purpose is to improve software quality and dependability for applications that require predictability and trust.
The goal of this micro-conference is making connections between folks working on similar projects, and help individual projects make progress.
This track is intended to promote collaboration between all the communities and people interested in the Kernel testing & dependability. This will help move the conversation forward from where we left off at the LPC 2022 Kernel Testing & Dependability MC.
We ask that any topic discussions focus on issues/problems they are facing and possible alternatives to resolving them. The Micro-conference is open to all topics related to testing on Linux, not necessarily in the kernel space.
Suggested topics:
- KernelCI: Topics on improvements and enhancements for test coverage
- Growing KCIDB, integrating more sources
- Sanitizers
- Using Clang for better testing coverage
- How to spread KUnit throughout the kernel?
- Building and testing in-kernel Rust code
- Explore ways to improve testing framework and tests in the kernelwith a specific goal to increase traceability and code coverage
- Explore how do SBOMs figure into dependability?
List of accomplishments this past year after LPC 2022:
- Developed a new, modern API for KernelCI with Pub/Sub interface
- Added Rust coverage in KernelCI
- KCIDB is continuing to gather results from many test systems: KernelCI, Red Hat’s CKI, syzbot, ARM, Gentoo, Linaro’s TuxSuite etc. The current focus is on generating common email reports based on this data and dealing with known issues.
- KFENCE is continuing to aid in detecting Out-of-bound OOB accesses, use-after-free errors (UAF), Double free and Invalid free and so on.
- Clang: CFI, weeding out issues upstream, etc.
- Kselftest continues to add coverage for new and existing features and subsystems.
- KUnit is continuing to act as the standard for some drivers and a de facto unit testing framework in the kernel
- The Runtime Verification (RV) interface from Daniel Bristot de Oliveira was merged.
Proposals can be submitted here, by August 20th:
MC leads can be reached for question and further information::
Shuah Khan (shuah@kernel.org)
Sasha Levin <sashal@kernel.org>
Guillaume Tucker <guillaume.tucker@collabora.com>
Linux Plumbers Conference: Live Patching MC CFP
After a three-year hiatus, the Live Patching Microconference is back for 2023.
Accomplishments post 2019 Microconference:
- API enhancements: Livepatch pre/post (un)patch callback system state change tracking was added in v5.5. The new API enhances the safety of cumulative livepatch upgrades [v5.5]
- KLP-relocations: To facilitate module_disable_ro() removal, arch-specific livepatch .klp.arg sections were deprecated. Special arch section KLP-relocations (like x86 jump labels) are still supported for vmlinux cases, and are now applied at the same time as normal relocations. [v5.8]
- Documentation: Practical information on how to implement reliable stacktraces needed by the livepatching consistency model was added [v5.12]
- Architecture: Implemented Power32 support [v5.18]
- KLP-relocations: To support target module reloading, clear KLP-relocations in livepatch modules when their target module is unloaded. This satisfies a module loader sanity check when resolving relocations on the next target module load (x86_64 only) [v6.3]
Discussion Topics
The following topics have been proposed:
- Shadow variables are considered a livepatching power-feature that can require careful management, especially across livepatch up and downgrades. Is garbage collection or a refactoring of callbacks a better approach to manage these resources?
- klp-relocations were originally introduced to resolve livepatch / kernel and module symbol scoping issues. Recent security features like CET and IBT suggest another use case and renewed interest in having an in-tree klp-relocation build support. Is a simple conversion utility sufficient, or does said tool require greater features?
- The livepatching kselftests consist of test scripts under tools/testing/selftests and associated livepatch module code in lib/. Consolidating these under the former offers better flexibility in templating the livepatch modules as well as the benefits of building them out-of-tree. Are there any outstanding blockers to implement these changes?
- arm64 support is moving forward on several fronts: toolchain, reliable stack unwinding, user space, etc. The Toolchains MC plans to address topics like CFG in ELF and handling of noinstr functions. What issues remain in livepatching and the kernel at large to fully support arm64?
- Rust looks to be a hot topic at this year’s LPC. Its impact on kernel livepatching is relatively open ended as Rust code has only recently been merged in small parts. That said, which features, problems, patchsets should we be paying attention to as we all learn more about this newly supported kernel language?
These potential discussion topics were selected from on-going livepatching mailing list threads, but additional livepatching related topics are welcome for consideration as well. For ideas on what makes for an ideal Microconference topic, checkout this post.
Több kórház ellátása szünetelt egy ransomware támadás miatt
Az FBI megerősítette, hogy 2023. augusztus 4-én egy ransomware támadás zavarta meg a kórházi számítógépes rendszereket, ami miatt egyes sürgősségi osztályokat is be kellett zárni, valamint a mentőket át kellett irányítani másik intézménybe. Ezen a napon számos alapellátási szolgáltatás szünetelt, miközben kiberbiztonsági szakértők dolgoztak a probléma mértékének meghatározásán és megoldásán. Az “adatvédelmi incidens” 2023. augusztus […]
The post Több kórház ellátása szünetelt egy ransomware támadás miatt first appeared on Nemzeti Kibervédelmi Intézet.
Security updates for Wednesday
Az Ön vállalata is alkalmazná a chatGPT-t? Az OWASP mankót ad a biztonságos implementációhoz
Az OWAP összegyűjtötte a nagy nyelvi modelleken (LLM) alapuló technológiák alkalmazása során felmerülő leggyakoribb biztonsági problémákat, és arra is tesz ajánlásokat, hogy ezeket hogyan védhetjük ki.
The post Az Ön vállalata is alkalmazná a chatGPT-t? Az OWASP mankót ad a biztonságos implementációhoz first appeared on Nemzeti Kibervédelmi Intézet.
Távoli kódfuttatási hibák a vm2-ben, patch nem várható
Javasolt mielőbb helyettesítő terméket választani a vm2 helyett, ugyanis kritikus hibákat fedeztek fel a népszerű sandbox-ban, miközben a projekt fejlesztői támogatása 2023 július 11-től megszűnt.
The post Távoli kódfuttatási hibák a vm2-ben, patch nem várható first appeared on Nemzeti Kibervédelmi Intézet.
[$] SFrame: fast, low-overhead stack traces
Stable kernels with security fixes
Do note the warning attached to each of these releases:
Note, PLEASE TEST this kernel if you are on the 6.4.y tree before using it in a real workload. This was a quick release due to the obvious security fixes in it, and as such, it has not had very much testing "in the wild". Please let us know of any problems seen. Also note that the user/kernel api for the new security mitigations might be changing over time, so do not get used to them being fixed in stone just yet.
Another round of speculative-execution vulnerabilities
Downfall attacks targets a critical weakness found in billions of modern processors used in personal and cloud computers. This vulnerability, identified as CVE-2022-40982, enables a user to access and steal data from other users who share the same computer. For instance, a malicious app obtained from an app store could use the Downfall attack to steal sensitive information like passwords, encryption keys, and private data such as banking details, personal emails, and messages. Similarly, in cloud computing environments, a malicious customer could exploit the Downfall vulnerability to steal data and credentials from other customers who share the same cloud computer.
A series of patches has landed in the mainline kernel, including one for gather data sampling mitigation and one to disable the AVX extension on CPUs where microcode mitigation is not available. "This is a *big* hammer. It is known to break buggy userspace that uses incomplete, buggy AVX enumeration."
Not to be left out, AMD processors suffer from a return-stack overflow vulnerability, again exploitable via speculative execution; this patch, also just merged, describes the problem and its mitigation.