Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Local Privilege Escalation On All Linux Kernels
slashdot ^ | August 13, 2009 | Tavis Ormandy and Julien Tinnes

Posted on 08/13/2009 10:09:28 PM PDT by zeugma

From Slashdot:

"Tavis Ormandy and Julien Tinnes have discovered a severe security flaw in all 2.4 and 2.6 kernels since 2001 on all architectures. 'Since it leads to the kernel executing code at NULL, the vulnerability is as trivial as it can get to exploit: an attacker can just put code in the first page that will get executed with kernel privileges.'"

Note: this is a local exploit, not remote. Looks like the fix for this is in the current tree and is being run through the standard processes.  The above link includes all the gory details.


TOPICS: Business/Economy; News/Current Events; Technical
KEYWORDS: linux; localexploit; root
Linux systems administrators with local untrusted users might want to keep a close eye on this one. Any defect that allows for root escalation is fairly serious.

1 posted on 08/13/2009 10:09:28 PM PDT by zeugma
[ Post Reply | Private Reply | View Replies]

To: ShadowAce

Tech ping for Linux folk. Appears to be an error with processing null pointers. Can’t believe those things are still around.


2 posted on 08/13/2009 10:11:25 PM PDT by zeugma (Will it be nukes or aliens? Time will tell.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: zeugma

Patch is already committed by Linux. Linux admins should update.


3 posted on 08/13/2009 10:25:17 PM PDT by taxcontrol
[ Post Reply | Private Reply | To 1 | View Replies]

To: zeugma

If you have physical access to a Linux computer unless you have information encrypted it’s not hard to get in.


4 posted on 08/13/2009 10:43:03 PM PDT by Nateman (If liberals aren't screaming you're doing it wrong.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nateman
If you have physical access to a Linuxany computer unless you have information encrypted it’s not hard to get in.

Fixed that for you.

You're welcome.

The issue with this particular defect is that it allows any local user to exploit it. Unlike MS-Windows, many unix systems have multiple users that can all be logged in remotely at the same time. Basically, if you have shell access, you can r00t the box. There appear to be ways to mitigate the vulnerability, such as turning off IPX and some other services.

If you're a home user that doesn't allow other folks to login to your box, this issue really doesn't affect you. I'm not worrying about the various linux boxes I have around the house, as I tend to trust my wife and mother-in-law not to try to hack our workstations. Systems administrators that allow shell access should be concerned though.

5 posted on 08/13/2009 10:51:48 PM PDT by zeugma (Will it be nukes or aliens? Time will tell.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: zeugma
Linux systems administrators with local untrusted users might want to kneecap untrusted local users until they repent and become trusted/hire the untrusted local user as the new PFY.

There, fixed it for you. I subscribe to the old-school admin theories.

/johnny

6 posted on 08/13/2009 10:54:57 PM PDT by JRandomFreeper (God Bless us all, each, and every one.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: zeugma
Also any publicly accessible computers, like an internet cafe or library should update their kernels as soon as fixes are available.
sudo yum -y update
reboot

Sucks to lose your uptime stats.

7 posted on 08/13/2009 10:56:09 PM PDT by zeugma (Will it be nukes or aliens? Time will tell.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: JRandomFreeper
LOL! Yeah. I can relate.

Sometimes you can't do that though. For instance a web-hosting company that provides shell access.

8 posted on 08/13/2009 10:58:40 PM PDT by zeugma (Will it be nukes or aliens? Time will tell.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: zeugma
When I was running servers that had shell access, I generally had scripts that watched for suspicious things and alerted me. It trapped one user that "Never changed anything. It worked yesterday, and it doesn't work today".

I escalated his case to management, who kneecapped him into submission. You have to have good management to fall back on.

/johnny

9 posted on 08/13/2009 11:05:56 PM PDT by JRandomFreeper (God Bless us all, each, and every one.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: taxcontrol
Patch is already committed by Linux. Linux admins should update.

Is there an official patch release level for 2.4 and 2.6 kernels that reflects the fix? I had a ton of patches on my Fedora 10 systems last weekend.

10 posted on 08/13/2009 11:10:58 PM PDT by Myrddin
[ Post Reply | Private Reply | To 3 | View Replies]

To: Myrddin
The patch article says all kernels prior to 2.6.30. The Fedora 10 patches have my current kernels at 2.6.27.29-170 as of last weekend. I just did a "yum update" and 11 MB of new patches arrived. No kernel update.
11 posted on 08/13/2009 11:55:11 PM PDT by Myrddin
[ Post Reply | Private Reply | To 10 | View Replies]

To: rdb3; Calvinist_Dark_Lord; GodGunsandGuts; CyberCowboy777; Salo; Bobsat; JosephW; ...

12 posted on 08/14/2009 5:23:58 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Myrddin

My work laptop is a Fedora 11 box and I also had a series of patches as well. In fact, I believe I will have to down rev udev in order to restore automount function for CD/DVD drive.

However, I do not know if the patches reflect the fix for this as Linus did not “mainstream” the patch till the 13th. I assume the security patch I received on the 13th included this but I am not sure. And to be honest, don’t really have a significant input or exposure as there are no other users on my laptop. This vulnerability is primarily targeted at those systems that are multi-user as it is a local exploit.


13 posted on 08/14/2009 10:45:06 AM PDT by taxcontrol
[ Post Reply | Private Reply | To 10 | View Replies]

To: taxcontrol
I'm not ready to jump to Fedora 11 right now. My boxes are all for software development or hosting web/SVN archives for my projects. I don't have a user population to worry about. I do have a security department that watches the patch level on one box that is in the company DMZ. I have to keep the patches current or risk having access cut off. It's just a web server with a mySQL database underneath.
14 posted on 08/14/2009 11:41:59 AM PDT by Myrddin
[ Post Reply | Private Reply | To 13 | View Replies]

To: zeugma

I know this is a probably a very stupid question, but what would happen if you could get the hardware to trap when anyone calls a null function pointer?


15 posted on 08/15/2009 5:37:32 AM PDT by beef (Who Killed Kennewick Man?)
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson