Understanding Linux kernel vulnerabilities

被引:4
|
作者
Shameli-Sendi, Alireza [1 ]
机构
[1] Shahid Beheshti Univ SBU, Fac Comp Sci & Engn, Tehran, Iran
关键词
Software security; Linux kernel vulnerability; Vulnerability taxonomies; TAXONOMY;
D O I
10.1007/s11416-021-00379-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Protecting the Linux kernel from malicious activities is of paramount importance. Several approaches have been proposed to analyze kernel-level vulnerabilities. Existing studies, however, have a strong focus on the attack type (e.g., buffer overflow). In this paper, we report on our analysis of 1,858 Linux kernel vulnerabilities covering a period of Jan 2010-Jan 2020. We classify these vulnerabilities from the attacker's view using various criteria such as the attacker's objective, the targeted subsystems of the kernel, the location from which vulnerabilities can be exploited (i.e., locally or remotely), the impact of the attack on confidentiality, system integrity and availability, and the complexity level associated with exploiting vulnerabilities. Our findings indicate the presence of a large number of low-complexity vulnerabilities. Most of them can be exploited from the local system, leading to attacks that can severely compromise the kernel quality of service, and allow attackers to gain privileged access
引用
收藏
页码:265 / 278
页数:14
相关论文
共 50 条
  • [21] Fuzzing the Linux Kernel
    Carabas, Costin
    Carabas, Mihai
    2017 COMPUTING CONFERENCE, 2017, : 839 - 843
  • [22] A practical approach to learning Linux vulnerabilities
    Karapetyants, Nikolay
    Efanov, Dmitry
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2023, 19 (03) : 409 - 418
  • [23] A practical approach to learning Linux vulnerabilities
    Nikolay Karapetyants
    Dmitry Efanov
    Journal of Computer Virology and Hacking Techniques, 2023, 19 : 409 - 418
  • [24] Understanding the low inter-rater agreement on aggressiveness on the Linux Kernel Mailing List☆
    Bock, Thomas
    Schneider, Niklas
    Schmid, Angelika
    Apel, Sven
    Siegmund, Janet
    JOURNAL OF SYSTEMS AND SOFTWARE, 2025, 222
  • [25] How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel
    Wang, Pengfei
    Krinke, Jens
    Lu, Kai
    Li, Gen
    Dodier-Lazaro, Steve
    PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), 2017, : 1 - 16
  • [26] MPLS Implementation for the Linux Kernel
    Maravic, Igor
    Smiljanic, Aleksandra
    2012 IEEE 13TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (HPSR), 2012,
  • [27] Linux 2.6 kernel exploits
    Duverger, Stephane
    JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2008, 4 (01): : 39 - 60
  • [28] Linux kernel development.
    Gordon, RS
    LIBRARY JOURNAL, 2005, 130 (10) : 166 - 166
  • [29] Influence in the Linux Kernel community
    Aaltonen, Timo
    Jokinen, Jyke
    OPEN SOURCE DEVELOPMENT, ADOPTION AND INNOVATION, 2007, 234 : 203 - +
  • [30] Cohesion analysis in Linux kernel
    Vinay Kumar, Reddy K.
    Janakiram, D.
    ASPEC 2006: 13TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2006, : 461 - +