Killswitch yakakurudzirwa kuti ibvise nekukurumidza mashandiro asina kusimba muLinux kernel.

Sasha Levin weNVIDIA, uyo anochengeta matavi eLTS eLinux kernel uye anoshanda mubhodhi remazano reLinux Foundation, akagadzira mapeti anoshandisa nzira ye killswitch yeLinux kernel. Chinhu ichi chinobvumira kudzima mashandiro ekernel ipapo ipapo. Killswitch yakagadzirirwa kubatsira pakuvhara zvikanganiso kwenguva pfupi kusvika kernel yagadziriswa ine kugadzirisa.

Killswitch inodzorwa kuburikidza nefaira re "/sys/kernel/security/killswitch/control", iro rinokutendera kuti ugadzirise kubatwa kwekernel function calls nemazita avo. Semuenzaniso, kuti uvhare Copy Fail vulnerability, ingowedzera murairo wekuti "engage af_alg_sendmsg -1" kufaira rekudzora kuti ugone kubatwa kwe af_alg_sendmsg function call wodzosera kodhi yekukanganisa "-1" panzvimbo pezvo.

Chero mavara anotsigirwa ne kprobes subsystem anogona kushandiswa semazita. Mazhinji ematambudziko makuru ekernel akawanikwa munguva pfupi yapfuura aripo muma subsystem anoshandiswa nevashandisi vashoma (semuenzaniso, AF_ALG, ksmbd, nf_tables, vsock, ax25). Kune vashandisi vazhinji, kusagadzikana kwekurasikirwa nekushanda mune mamwe mabasa hakuna kukodzera njodzi yekushandisa kernel ine hutachiona hunozivikanwa, husina kurongwa kusvika patch yaiswa. Killswitch mechanism inonyanya kukosha mumamiriro ezvinhu e Dirty Frag vulnerability iripo, iyo exploit yakaburitswa nyaya isati yagadziriswa mu kernel.

Source: opennet.ru