this post was submitted on 24 Aug 2024
238 points (97.2% liked)

Technology

59589 readers
2891 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] lud@lemm.ee 8 points 3 months ago (11 children)

Microsoft didn't cause the "disaster" though.

[–] deegeese@sopuli.xyz 1 points 3 months ago (4 children)

Running security products in kernel mode is precisely what caused this disaster.

[–] lud@lemm.ee 1 points 3 months ago (3 children)

It needs that kind of access to fight advanced attacks. It would surprise me if similar EDR programs didn't have similar access on Linux systems, for example.

[–] deegeese@sopuli.xyz 1 points 3 months ago (1 children)

No, you make a management API for security products that run in user space as root, you don't use kernel modules.

[–] lud@lemm.ee 1 points 3 months ago (1 children)

Is that the way that EDR is implemented on Linux or are you guessing?

[–] progandy@feddit.org 1 points 2 months ago* (last edited 2 months ago)

Currently, cloudstrike offers two methods for Linux: a kernel driver / module and a theoretically safer alternative using epbf (you could call that "kernel level scripting"). Ironically, they triggered a kernel bug using that second option. They did not test all kernels they listed as compatible or something like that.

load more comments (1 replies)
load more comments (1 replies)
load more comments (7 replies)