Linux Security News Archives


258 Linux Security open-source and Linux related news articles on Phoronix since 2006.

Linux Will Stop Randomizing Per-CPU Entry Area When KASLR Is Not Active
Linux Will Stop Randomizing Per-CPU Entry Area When KASLR Is Not Active

With the Linux 6.2 release kernel developers addressed "a tasty target for attackers" after it was realized that the per-CPU entry data was not being randomized, even in the presence of Kernel Address Space Layout Randomization (KASLR). The per-CPU entry area randomization has been present since Linux 6.3 but then was realized it's being activated even if KASLR was disabled, so now that is changing to avoid possible confusion.

26 March 2023 - Avoids Randomizing When KASLR Off - 2 Comments
Linux Landing Change To Allow STIBP When Using Legacy IBRS
Linux Landing Change To Allow STIBP When Using Legacy IBRS

Ahead of the Linux 6.3-rc1 release later today, a set of "x86/urgent" patches were sent out Sunday morning that include the change to allow Single Threaded Indirect Branch Predictors (STIBP) to be used in the presence of legacy Indirect Branch Restricted Speculation (IBRS) for security reasons.

5 March 2023 - STIBP + Legacy IBRS - 2 Comments
Linux Inadvertently Has Been Leaving IBRS-Mitigated Systems Without STIBP
Linux Inadvertently Has Been Leaving IBRS-Mitigated Systems Without STIBP

The Linux kernel since last year has mistakenly left systems relying on the original Indirect Branch Restricted Speculation (IBRS) for Spectre V2 mitigation without Single Threaded Indirect Branch Predictor (STIBP) coverage for cross-HyperThread dealing with this Spectre vulnerability. There is a patch underway that is resolving this issue for Intel Skylake era systems.

27 February 2023 - Linux Needs IBRS + STIBP - 4 Comments
Open Source Security Foundation's Criticality Score 2.0 Debuts To Rank Important OSS Projects
Open Source Security Foundation's Criticality Score 2.0 Debuts To Rank Important OSS Projects

Back in 2020 Google and the Open-Source Security Foundation (OpenSSF) came up with a "Criticality Score" to rank the importance/criticality of open-source projects. The Criticality Score is a means of quantifying the importance of an open-source project such as if in need of funding or development assistance. Criticality Score 2.0 has now been published.

24 February 2023 - OpenSSF Criticality Score 2.0 - 10 Comments
Landlock Security Module Adds File Truncation Support With Linux 6.2

Merged back in Linux 5.13 last year was Landlock for allowing unprivileged application sandboxing. Landlock allows restricting ambient rights for a set of processes and is implemented as a stackable Linux security module (LSM) for establishing safe security sandboxes. With Linux 6.2 file truncation support is added for Landlock.

18 December 2022 - Landlock - 9 Comments
Intel Preparing Virtual IA32_SPEC_CTRL Support For The Linux Kernel
Intel Preparing Virtual IA32_SPEC_CTRL Support For The Linux Kernel

Intel on Sunday posted a set of Linux patches implementing SPEC CTRL virtualization support for this VMX feature with new Intel CPUs to help with migrating virtual machines to hosts with different CPU microarchitectures where their security mitigations may be different.

11 December 2022 - Virtual IA32_SPEC_CTRL - 4 Comments
Linux Moving Ahead With Enabling Kernel IBT By Default
Linux Moving Ahead With Enabling Kernel IBT By Default

As an enhancement to the out-of-the-box Linux kernel in its default x86_64 configuration, it was being eyed to enable Indirect Branch Tracking by default. That change to enable IBT by default has been picked up by TIP's x86/core branch, thus putting it on deck as material for submitting with next month's Linux 6.2 merge window.

5 November 2022 - Indirect Branch Tracking - Add A Comment
Linux Still Eyes Better Security By Default Enabling Indirect Branch Tracking (IBT)
Linux Still Eyes Better Security By Default Enabling Indirect Branch Tracking (IBT)

Indirect Branch Tracking (IBT) is still being eyed for enabling as part of the default Linux x86_64 kernel configurations to provide better out-of-the-box security on supported processors. A patch sent out today continues the upstream discussion over flipping on this feature by default that is part of Intel's Control-flow Enforcement Technology (CET) for helping to defend against jump/call oriented programming attacks.

1 November 2022 - X86_KERNEL_IBT - Add A Comment
OpenSSL Outlines Two High Severity Vulnerabilities
OpenSSL Outlines Two High Severity Vulnerabilities

Two high severity security vulnerabilities affecting OpenSSL were made public today, which were the issues that led to Fedora 37 being delayed to mid-November to allow the release images have mitigated OpenSSL packages.

1 November 2022 - OpenSSL Vulnerabilities - 17 Comments
Call Depth Tracking Aligning For Linux 6.2 To Lessen Mitigation Performance Hit For Intel Skylake
Call Depth Tracking Aligning For Linux 6.2 To Lessen Mitigation Performance Hit For Intel Skylake

While the Linux 6.1 merge window just passed and the "Call Depth Tracking" patches have been in development the past few months, it looks like that for the Linux 6.2 kernel is where that alternative mitigation technique will be introduced for helping offset some of the significant performance regressions incurred for Intel Skylake era processors as a result of recent CPU security vulnerability mitigations.

19 October 2022 - Call Depth Tracking - 3 Comments
Git 2.38.1 Released For Two New Security Vulnerabilities

Git 2.38.1 was just released along with updates to older versions, including the new point releases of v2.30.6, v2.31.5, v2.32.4, v2.33.5, v2.34.5, v2.35.5, v2.36.3, and v2.37.4. The big set of Git updates today is due to two more security issues coming to light.

18 October 2022 - Git 2.38.1 - 3 Comments
Linux 6.1 Feature Would Have Caught All memcpy Based Buffer Overflows Of Recent Years
Linux 6.1 Feature Would Have Caught All memcpy Based Buffer Overflows Of Recent Years

A kernel hardening security improvement on the way for Linux 6.1 is the ability to provide warning of possible memcpy() based overflows. Right now this is only a warning but it's work towards being able to address "trivially detectable" buffer overflow conditions within the kernel and in the future may be able to block such overflows from happening.

3 October 2022 - Hardening The Kernel - 19 Comments
Linux getrandom() vDSO Patch Updated For ~15x Speedup

Over the summer Jason Donenfeld of WireGuard fame proposed adding getrandom() to the vDSO for better performance to enjoy by user-space developers. This past week he sent out the latest version of this proposed kernel patch where he's seeing around a ~15x speed-up with this change.

18 September 2022 - Faster getrandom() - 11 Comments
Google Engineers Argue For Linux "ASI" To Better Deal With Speculative Execution Attacks
Google Engineers Argue For Linux "ASI" To Better Deal With Speculative Execution Attacks

Proposed a few years ago was Kernel Address Space Isolation (KASI / ASI) for limiting data leaks with the growing number of speculative execution attacks on CPUs. Several organizations have been involved with Address Space Isolation efforts for the Linux kernel including IBM, Oracle, and Google with various approaches. Google engineers earlier this year posted a newer iteration of ASI focused on KVM use for the cloud / VMs. ASI still hasn't made it to the mainline kernel but Google engineers this week at LPC argued that it should be the path forward for mainline in better dealing with these CPU security vulnerabilities.

17 September 2022 - Address Space Isolation - 33 Comments
Call Depth Tracking For Less Costly Retbleed Mitigation Hopes To Land Soon
Call Depth Tracking For Less Costly Retbleed Mitigation Hopes To Land Soon

Longtime Linux kernel engineer Peter Zijlstra with Intel has sent out his latest "Call Depth Tracking" patches as a mitigation for Retbleed that aims to be less costly on system performance than the current mitigation approach. With this latest patch series, he indicates he hopes to soon get this code mainlined.

17 September 2022 - Call Depth Tracking - 7 Comments
Call Depth Tracking Mitigation Updated For Linux In Better Mitigating Retbleed
Call Depth Tracking Mitigation Updated For Linux In Better Mitigating Retbleed

Back in July Intel's Peter Zijlstra proposed "Call Depth Tracking" as a mitigation approach for handling Retbleed and avoiding the "performance horror show" of Indirect Branch Restricted Speculation (IBRS) usage. Out today is the newest version of the Call Depth Tracking code and the performance benchmark results are looking very promising for lessening the pain of the Retbleed CPU mitigation performance impact.

2 September 2022 - Call Depth Tracking Mitigation - 10 Comments
Linux x86 32-bit Is Vulnerable To Retbleed But Don't Expect It To Get Fixed
Linux x86 32-bit Is Vulnerable To Retbleed But Don't Expect It To Get Fixed

While relevant Intel and AMD processors have been mitigated for the recent Retbleed security vulnerability affecting older generations of processors, those mitigations currently just work for x86_64 kernels and will not work if running an x86 (32-bit) kernel on affected hardware. But it's unlikely to get fixed unless some passionate individual steps up as the upstream developers and vendors have long since moved on to just caring about x86_64.

24 July 2022 - Linux x86 + Retbleed - 24 Comments
Linux Lands Fix For A Trivial Lockdown Bypass Bug
Linux Lands Fix For A Trivial Lockdown Bypass Bug

Merged this afternoon to the mainline Linux 5.19 Git kernel and set for back-porting is a fix for a new security bug. Oracle made public CVE-2022-21505 on Tuesday as a trivial bypass to the Linux kernel's lockdown mode.

20 July 2022 - CVE-2022-21505 - 7 Comments
Linux To Drop "nordrand" Option - Users Should Instead Switch To "random.trust_cpu"
Linux To Drop "nordrand" Option - Users Should Instead Switch To "random.trust_cpu"

The Linux kernel has long honored the "nordrand" kernel parameter to disable kernel use of the Intel RDRAND and RDSEED instructions if not trusting them -- either out of security concerns that they could be compromised by the vendor or running into hardware/firmware issues around RdRand usage. But the Linux kernel is preparing to drop that kernel parameter with users encouraged to use the more generic "random.trust_cpu" parameter.

10 July 2022 - RdRand Bull Mountain - 6 Comments
Experimental "FineIBT" Series Published For Linux - Building Atop Intel CET/IBT
Experimental "FineIBT" Series Published For Linux - Building Atop Intel CET/IBT

Merged as part of Linux 5.18 is Intel's Indirect Branch Tracking (IBT) support as part of CET (Control Flow Enforcement) technology. Indirect Branch Tracking is intended to help protect against JUMP/CALL oriented attacks as part of CET's control-flow integrity protections. Meanwhile still being worked on is "FineIBT" as a more compiler-hardened version built atop Intel CET/IBT.

20 April 2022 - FineIBT - 2 Comments
Linux To Try To Opportunistically Initialize /dev/urandom

Linux 5.18 is bringing many random/RNG improvements thanks to the work of kernel developer Jason Donenfeld. One of the changes though that had to be backed out during the merge window was trying to get /dev/random and /dev/urandom to behave exactly the same. While reverted for now with the 5.18 code, Donenfeld has prepared a change that should get it into good shape for major architectures with the next kernel cycle.

7 April 2022 - Linux RNG - 9 Comments
x86 Straight Line Speculation CPU Mitigation Appears For Linux 5.17
x86 Straight Line Speculation CPU Mitigation Appears For Linux 5.17

The Linux 5.17 kernel is introducing support for the x86 straight-line speculation "SLS" mitigation with it becoming increasingly clear modern x86_64 CPUs are susceptible to speculatively executing linearly in memory past an unconditional change in control flow.

12 January 2022 - Straight Line Speculation - 4 Comments
FGKASLR Is An Exciting Linux Kernel Improvement To Look Forward To In 2022
FGKASLR Is An Exciting Linux Kernel Improvement To Look Forward To In 2022

It's been nearly two years in the making since Intel posted FGKASLR patches for improving Linux kernel security. While that work on Finer Grained / Function Granular KASLR stalled for a year, in recent months work on it was revived and in 2022 looks like this security is on a path for mainlining.

26 December 2021 - Function Granular KASLR - 3 Comments
FGKASLR Appears Closer To Mainline For Improving Linux Security
FGKASLR Appears Closer To Mainline For Improving Linux Security

Kernel Address Space Layout Randomization has been common on Linux for a decade and a half now while more recently has been Function-Granular (or sometimes referred to as Finer-Grained) KASLR for further upping the security benefits by making it much harder to predict kernel address positions for attacks.

3 December 2021 - Function Granular KASLR - 1 Comment
Google Proposes "Page Table Check" For Fighting Some Types Of Linux Memory Corruption
Google Proposes "Page Table Check" For Fighting Some Types Of Linux Memory Corruption

Last week Google engineers uncovered a reference count underflow issue affecting all Linux kernels going back to v4.14 in 2017. This issue led to memory leaking from one process to another and only uncovered by accident. To address this class of memory corruption issues moving forward, Google is proposing a new "Page Table Check" feature moving forward.

17 November 2021 - Page Table Check - 9 Comments

258 Linux Security news articles published on Phoronix.