“Google reveals discovered vulnerabilities in CentOS Linux kernel due to delayed resolution – Neowin”

npressfetimg-213.png

.

Google Project Zero: A Force to Be Reckoned with in the Cybersecurity World

Google Project Zero, a renowned security team dedicated to finding vulnerabilities in Google’s own products and software developed by other vendors, has yet again made headlines. This time, the team has uncovered several flaws in the CentOS kernel, bringing to light the importance of timely updates and the potential risks of not staying up-to-date.

The Underlying Issue

According to a technical document penned by Google Project Zero’s security researcher Jann Horn, it was discovered that kernel fixes made to stable trees were not being backported to many enterprise versions of Linux. To test this hypothesis, Horn compared the CentOS Stream 9 kernel to the stable linux-5.15.y stable tree. The findings were expected – several critical kernel fixes were missing in older, yet still supported versions of CentOS Stream/RHEL.

Moreover, Horn also noted that Google Project Zero is giving a 90-day deadline for a fix to be released. However, they may resort to even stricter deadlines in the future for missing backports. This move is in line with the team’s dedication to maintaining high security standards and safeguarding users from potential attacks.

Red Hat’s Response

While Red Hat has accepted all three reported bugs and assigned them CVE numbers, they have not been able to fix them within the allotted 90-day timeline. As a result, Google Project Zero has made these vulnerabilities public, adding more urgency to the need for prompt fixes.

The Vulnerabilities at a Glance

– CVE-2023-0590: A moderate severity use-after-free flaw in the Linux kernel due to a race condition, with a local attack vector
– CVE-2023-1252: A moderate severity use-after-free vulnerability in the Linux kernel’s Ext4 File System, allowing an attacker to crash the system or elevate privileges, with a local attack vector
– CVE-2023-1249: A low severity use-after-free flaw in the Linux kernel’s core dump subsystem, which can enable an attacker to crash the system, with a local attack vector

Take Action Now

With the details of these vulnerabilities now public, it is crucial for Red Hat to take swift action in fixing them. This not only helps to maintain the trust of their users but also prevents any potential threats that may arise from these weaknesses.

It is equally important for other vendors and distributions to learn from this and ensure that their security fixes are regularly in sync with upstream Linux. This will help to prevent attackers from exploiting any loopholes in the system and protect users from harm.

Stay informed, stay updated, and stay secure – don’t let your guard down when it comes to your online safety. Let Google Project Zero’s latest discoveries serve as a reminder to always prioritize security.

By CentOS

Leave a Reply

Your email address will not be published. Required fields are marked *

No widgets found. Go to Widget page and add the widget in Offcanvas Sidebar Widget Area.