Microsoft to Create Linux Kernel WSL2 Mods Repo

The Linux kernel for WSL2 (Windows Subsystem for Linux v2) is based on release 4.19, which runs in a Windows environment using a VM used in Azure
01 July 2019   246

Microsoft has published all changes and additions to the Linux kernel used in the kernel for the WSL 2 subsystem (Windows Subsystem for Linux v2). The second edition of WSL is a full-fledged Linux kernel, instead of an emulator translating Linux system calls into Windows system calls on the fly. The availability of source code allows enthusiasts to build their Linux kernel builds for WSL2, if desired, taking into account the nuances of this platform.

The Linux kernel shipped in WSL2 is based on release 4.19, which runs in a Windows environment using a virtual machine already used in Azure. Updates for the Linux kernel are delivered through the Windows Update mechanism and are tested in the Microsoft continuous integration infrastructure. Prepared patches include optimizations to reduce kernel startup time, reduce memory consumption, and leave the minimum required set of drivers and subsystems in the kernel.

In addition, Microsoft has applied for a linux-distros private mailing list that publishes information about new vulnerabilities at an early stage of their detection, allowing distributions to prepare to fix problems before public announcement. Access to the mailing list is required by Microsoft to obtain information about new vulnerabilities affecting such distributional-like assemblies as Azure Sphere, Windows Subsystem for Linux v2 and Azure HDInsight, which are not based on practices of existing distributions. Greg Kroah-Hartman, who is responsible for maintaining a stable kernel branch, is ready to act as a guarantor. The decision to grant access has not yet been made.

Get more info at GitHub.

Two Vulnerabilities to be Found at SDL

Two of six serious vulnerabilities in this cross-platform multimedia library create conditions for remote code execution.
04 July 2019   874

The SDL (Simple Direct Layer) library set, which provides tools for hardware accelerated 2D and 3D graphics rendering, input processing, audio playback, 3D output via OpenGL / OpenGL ES, and many other related operations, revealed 6 vulnerabilities. Including in the SDL2_image library, two problems have been discovered that allow organizing remote code execution in the system. Attacks can be made on applications that use SDL to load images.

Both vulnerabilities (CVE-2019-5051, CVE-2019-5051) are present in the IMG_LoadPCX_RW function and are caused by the lack of the necessary error handler and integer overflow that can be exploited through the transfer of a specially crafted PCX file. Issues have already been fixed in the SDL_image 2.0.5 release. Information about the remaining 4 vulnerabilities has not yet been disclosed.

Vulnerabilities were found by Talos, so you can find more info at their website.