Security fixes for kernel valnerabilities

Forum Forums New users New Users and General Questions Security fixes for kernel valnerabilities

  • This topic has 5 replies, 3 voices, and was last updated Mar 21-1:28 am by ModdIt.
Viewing 6 posts - 1 through 6 (of 6 total)
  • Author
    Posts
  • #33630
    Member
    Noman01

      Mine is a general question on the kernel patching, how do these problems get into the system. I know people make the programs the cause the problems, but how do they get into system.

      #33631
      Member
      sybok
        Helpful
        Up
        0
        ::

        Hi, not 100% sure what do you ask about; there are two different topics I can think of:

        1) Kernel vulnerability:
        Source: Problem in the kernel = the code was written in a bad way.
        Into the system via: Installing the faulty code.

        2) Kernel changes/tweaks to minimize effect of other sources of vulnerabilities:
        Source: For example hardware such as CPU architecture (hence the in-famous issues called Meltdown, Spectre etc.)
        Into the system via: hardware/CPU your device consists of.

        Hope that helps a bit.

        • This reply was modified 3 years, 1 month ago by sybok. Reason: Improved with better wording
        #33634
        Member
        Noman01
          Helpful
          Up
          0
          ::

          My question is related to #2 basically how do these attacks happen, is it because of going to a bad site, downloading something, or a search bot looking for holes in a system and attacking your system?

          #33636
          Member
          sybok
            Helpful
            Up
            0
            ::

            I recall there was a fix for browser to minimize the risk of executing a remote attack but some of the vulnerabilities require local access to your PC.
            Sorry, not an expert on that but e.g. this link to an overview of vulnerabilities clearly states that Rowhammer.js was browser-exploitable.
            You can read it for more details.

            Another potential issue is crypto-currency mining scripts run in memory, loaded via browsers (there is an adblock filter/local modification of /etc/hosts to block known servers that do that) which is not related to any of those issues you asked about – this is about executing unwanted code using resources of your PC.

            In general, one should follow the “standard rules” (as listed e.g. at PC world article on how to protect):

            – Update your operating system
            – Check for firmware updates
            – Update your browser
            – Update other software
            – Keep your antivirus active (if you have any)

            #33638
            Member
            Noman01
              Helpful
              Up
              0
              ::

              Thanks for the follow up info.

              #33648
              Member
              ModdIt
                Helpful
                Up
                0
                ::

                Hi guys, as far as standard rules are concerned, common sense, no snake oil virus scanners.
                They are maybe not what you are expecting. Read up on that.

                Switch on your firewall.

                Read and impliment forum posts on making Firefox more secure. It is still
                probably the best Browser security wise but not as delivered.

                Go to Ghacks website and do some reading, it is excellent.
                You can go to shields up website to do further reading and checks on your system.

                You may wish to install use Firejail. It may need some work to have your system running smoothly.
                Do install the config too. Then setup with sudo firecfg

                Set a BIOS password. Do not enable Auto Login.
                If others have access to your computer disable media automount.
                Lock screen when you leave room.

                Unplug Network.
                Bluetooth, code in Wireless cards Intel management engine
                are further things to read about.

                All computer code might have vunerability, in many cases by design.

                • This reply was modified 3 years, 1 month ago by ModdIt.
              Viewing 6 posts - 1 through 6 (of 6 total)
              • You must be logged in to reply to this topic.