CrowdStrike has caused PCs to become unable to boot in the past on Linux distributions as well



On July 19, 2024, a problem occurred worldwide in which 'Windows displays a blue screen and is forced to restart repeatedly,' causing disruptions such as

flight suspensions on United Airlines and American Airlines. This problem was caused by cybersecurity service provider CrowdStrike distributing a problematic channel file during an update, but it has been revealed that similar problems had occurred in Linux distributions Debian and Rocky Linux even before this problem occurred.

Ridiculous vulnerability disclosure process with CrowdStrike Falcon Sensor | mod%log
https://modzero.com/modlog/archives/2022/08/22/ridiculous_vulnerability_disclosure_process_with_crowdstrike_falcon_sensor/index.html



CrowdStrike broke Debian and Rocky Linux months ago, but no one noticed - Neowin

https://www.neowin.net/news/crowdstrike-broke-debian-and-rocky-linux-months-ago-but-no-one-noticed/

According to CrowdStrike , the cause of this issue was an error that occurred when strengthening the security of named pipes , one of the communication methods between programs, to address issues with the ' Command and Control (C2) framework' commonly used in cyber attacks. This error is said to have caused repeated crashes and blue screens on PCs running CrowdStrike Falcon Sensor for Windows version 7.11 or later that were online during the update release period, and Microsoft estimates that the number of affected computers is 'approximately 8.5 million worldwide.'

In response to this issue, CrowdStirke CEO George Kurtz issued a statement apologizing to customers, stating, ' We are aware of the cause of this issue and are conducting a thorough root cause analysis.' 'The issue has been identified and isolated, and a fix has been distributed,' he said.

There have been many reports of CrowdStrike-related problems in the past, including an incident in April 2024 when all of the Debian Linux servers at the research organization's CivicTech lab crashed simultaneously and refused to boot. It was later discovered that this was due to CrowdStrike updates being incompatible with the latest stable version of Debian, which supports certain Linux configurations. The CivicTech Lab discovered that removing CrowdStrike allowed the machines to boot, and took action to address the situation.



In addition, users who upgraded to

Rocky Linux 9.4 have reported issues with 'kernel bugs causing servers to crash.' CrowdStrike claims that there was 'insufficient testing and insufficient attention to compatibility issues between different operating systems' in response to this issue.

In addition, software developer Modzero has been pursuing a vulnerability that existed in CrowdStrike in August 2022. According to Modzero, this vulnerability allows an attacker with administrator privileges to bypass CrowdStrike's Falcon Agent Uninstall Protection function when control flow management of the CrowdStrike Falcon Sensor is insufficient .

Although the overall risk of this vulnerability was very limited because an attacker would need high privileges to exploit it, Modzero reported the vulnerability to CrowdStrike, who in turn informed Modzero that the issue could not be reproduced in the latest version under development and determined that the issue was not valid.



The latest version released after that flagged the vulnerability pointed out by Modzero as 'malicious behavior'. It has been confirmed that the same vulnerability appeared when Modzero made a small change to CrowdStrike's exploit. Modzero criticized, 'Vendors and researchers need to act responsibly and show mutual goodwill and transparency.'

in Software, Posted by log1r_ut