this post was submitted on 04 Oct 2023
276 points (98.9% liked)

Linux

46794 readers
1183 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS
 

From BeepingComputer.

all 50 comments
sorted by: hot top controversial new old
[–] [email protected] 125 points 10 months ago* (last edited 10 months ago) (3 children)

A new Linux vulnerability known as 'Looney Tunables' enables local attackers to gain root privileges by exploiting a buffer overflow weakness in the GNU C Library's ld.so dynamic loader.

It’s always memory management

[–] [email protected] 123 points 10 months ago (2 children)

It’s always memory management

No wonder everyone's crazy about Rust.

[–] [email protected] 62 points 10 months ago (2 children)

It's certainly why it is being used to build browsers and OSs now. Those are places were memory management problems are a huge problem. It probably doesn't make sense for every match 3 game to be made in Rust, but when errors cause massive breaches or death, it's a lot safer than C++, taking human faulability into account.

[–] [email protected] 21 points 10 months ago (2 children)

Question would be rather: why is something like C++ needed for such simple apps?

C++ seems to be in that weird in-between place of offering high level features to be reasonable productive, but still doesn't enforce/guarantee anything to make these features safe. I'd argue, very few programs need that. Either you're writing business stuff, then you want safety (Java, C#, rust), or you're writing embedded/low level stuff, then you want control (C, ASM).

The room for "productive, but not interested in safety" is basically just AAA games, I guess.

[–] [email protected] 10 points 10 months ago (1 children)

C is almost the old "steady" standard now it feels like. It's so flexible and the frameworks are already built..

[–] [email protected] 15 points 10 months ago

...except that we also end up with cracks in our foundations like this exploit constantly being exposed as a result of all that C

[–] [email protected] 7 points 10 months ago

Well you're not going to write asm if you want your code to be portable at all, and believe it or not C++ has a lot of features to help you not shoot yourself in the foot that C doesn't have (ex. OOP, RAII, smart pointers).

C wasn't really designed with dynamic memory management in mind. It was designed for someone who has absolute control over a machine and all the memory in it. malloc() and free() are just functions that some environments expose to user mode processes, but C was never designed to care where you got your memory or what you do with it.

[–] [email protected] 8 points 10 months ago (3 children)

What makes rust so resiliant against these types of atacks?

[–] [email protected] 7 points 10 months ago (1 children)

The short answer is Rust was built with safety in mind. The longer answer is C was built mostly to abstract from assembly without much thought to safety. In C, if you want to use an array, you must manually request a chunk of memory, check to make sure you are writing within the bounds of your array, and free up the memory used by your array when completely done using it. If you do not do those steps correctly, you could write to a null pointer, cause a buffer overflow error, a use-after-free error, or memory leak depending on what step was forgotten or done out of order. In Rust, the compiler keeps track of when variables are used through a borrowing system. With this borrowing system the Rust compiler requests and frees memory safely. It also checks array bounds at run-time without a programmer explicitly needing to code it in. Several high-level languages have alot of these safety features too. C# for example, can make sure objects are not freed until they fall out of scope, but it does this at run-time with a garbage collector where Rust borrower rules are done at compile-time.

[–] [email protected] 1 points 10 months ago* (last edited 10 months ago)

C was built mostly to abstract from assembly

That’s actually not true; rather, many modern architectures are designed to allow languages like C to be compiled more easily. Old architectures don’t even have a built-in stack.

[–] [email protected] 5 points 10 months ago* (last edited 10 months ago)

The compiler enforces "aliasing XOR mutability"; utilizes "move semantics"; has a "borrowing and ownership" model; and requires the programmer to tag their references with "lifetimes". Array accesses are checked at runtime if they cannot be guaranteed safe at compile-time. Variables passed by value (moved) cannot be reused. Variables cannot be moved or mutated if any borrow to them exists. You may either have only one mutable borrow, or many immutable borrows, but never both. Therefore you cannot mutate an array while iterating on it, and you cannot have two separate unchecked references to the same array. Every function or type that accepts a borrow must be able to annotate the lifetimes of references to ensure that references are always dropped in the correct order to prevent dangling references. Rust requires developing software with discipline using patterns that satisfy all of these constraints.

[–] Eezyville 35 points 10 months ago (2 children)

Didn't Microsoft do a study on security vulnerabilities and found that the overwhelmingly number of bugs was due to memory management?

[–] [email protected] 27 points 10 months ago (1 children)
[–] [email protected] 14 points 10 months ago* (last edited 10 months ago) (1 children)

That was the what I was thinking of when I wrote the comment. The CTO of Azure also said that he deems C++ in it’s entirety to be deprecated. I felt it was an exaggeration at first but I’ve started to agree with him recently.

Google also noticed a 33% decrease in Google Home crashes caused by NullPointerExceptions after switching to Kotlin. They have also declared Kotlin to be the preferred language for android.

It seems like the industry is shifting towards “safer” languages.

[–] [email protected] 4 points 10 months ago

I'm not in America but the organisation for NIST recommends it in guidance now and its getting backing by the nsa

https://www.nsa.gov/Press-Room/News-Highlights/Article/Article/3215760/nsa-releases-guidance-on-how-to-protect-against-software-memory-safety-issues/

https://www.zdnet.com/article/nsa-to-developers-think-about-switching-from-c-and-c-to-a-memory-safe-programming-language/ https://www.malwarebytes.com/blog/news/2022/11/nsa-guidance-on-how-to-avoid-software-memory-safety-issues

I see this becoming required in the future for new projects and solutions when working for new governnent solutions. The drum is certainly beating louder in the media about it.

[–] [email protected] 13 points 10 months ago

See? All code sucks.

[–] [email protected] 51 points 10 months ago (2 children)

It says "sysadmins should prioritise patching", but... has it been patched yet?

[–] [email protected] 65 points 10 months ago (1 children)

Just like…make a patch. It’s not that hard lol /j

[–] [email protected] 23 points 10 months ago

To show you the power of Flex Tape, I sawed this library in half!

[–] [email protected] 21 points 10 months ago

Yes, most of the major distributions have package updates with the fix. A few people have mentioned updates for Arch, Debian, and RedHat already.

Ubuntu released an update yesterday as well:

https://launchpad.net/ubuntu/+source/glibc/2.35-0ubuntu3.4

Ubuntu derivatives such as Pop!_OS should have also received this update, along with the X11 patches.

[–] [email protected] 34 points 10 months ago (2 children)

I wonder if this could be used to root previously unrootable Android based devices.

[–] [email protected] 55 points 10 months ago (1 children)

Android doesn't use glibc, but Bionic, a C standard library developed by Google. So I don't think this vulnerability affects Android.

[–] [email protected] 9 points 10 months ago (1 children)

What the heck. I thought, they were using musl.
Certainly seems like this has rather similar goals to musl...

[–] [email protected] 17 points 10 months ago (1 children)

That's no reason for Google not to reinvent the wheel....

They did the same with dalvik and ART now. JVMs, but more googlier!

[–] [email protected] 1 points 10 months ago

And Quic, and Pony express, and GFS...

[–] [email protected] 16 points 10 months ago

Think Android uses Bionic instead of glibc (where the vulnerability is being exploited).

[–] [email protected] 18 points 10 months ago (3 children)

Just got some glibc updates in Arch yesterday. I wonder if they contain fixes for this.

[–] [email protected] 18 points 10 months ago (1 children)
[–] [email protected] 8 points 10 months ago (1 children)

Thanks! Not just for notifying about the fix but also showing me where package revisions are built from! I just love the transparency of Arch.

[–] aBundleOfFerrets 1 points 10 months ago

Arch is a meme, but it is honestly really cool too.

[–] [email protected] 7 points 10 months ago* (last edited 10 months ago) (1 children)

Makes me wonder. LMDE got a glibc update too and Mint is very much not leading edge when it comes to non-critical updates.

Case in point, at roughly the same time as the glibc update, we (LMDE users) were upgraded to the latest Thunderbird, 115.3.1, four or five days after that sub-version came out. That's the sort of lag we generally see. (115.x was a bit of a surprise too as we've been on 102.x, but that's not strictly relevant here.)

[–] [email protected] 1 points 10 months ago* (last edited 10 months ago)

Ran nala after seeing this post and got a libc update on Debian myself

[–] [email protected] 3 points 10 months ago (1 children)

Wonder if musl is fine. If so,Void people are certainly having fun now.