topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Saturday December 14, 2024, 7:40 am
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Author Topic: Bug in latest Linux gives untrusted users root access  (Read 5840 times)

Josh

  • Charter Honorary Member
  • Joined in 2005
  • ***
  • Points: 45
  • Posts: 3,411
    • View Profile
    • Donate to Member
Bug in latest Linux gives untrusted users root access
« on: November 04, 2009, 11:19 AM »
A software developer has uncovered a bug in most versions of Linux that could allow untrusted users to gain complete control over the open-source operating system.

The null pointer dereference flaw was only fixed in the upcoming 2.6.32 release candidate of the Linux kernel, making virtually all production versions in use at the moment vulnerable. While attacks can be prevented by implementing a common feature known as mmap_min_addr, the RHEL distribution, short for Red Hat Enterprise Linux, doesn't properly implement that protection, Brad Spengler, who discovered the bug in mid October, told The Register.

What's more, many administrators are forced to disable the feature so their systems can run developer tools or desktop environments such as Wine.

The vulnerability was first reported by Spengler, a developer at grsecurity, a maker of applications that enhance the security of Linux. On October 22, he wrote a proof of concept attack for the local root exploit. Over the past few months, he has emerged as an outspoken critic of security practices followed by the team responsible for the Linux kernel.

"It's interesting to me that I picked it out two weeks before the people whose job it is to find this sort of stuff," he said Tuesday. "They've got entire teams of people and I'm just one person doing this in my free time."

Source

Paul Keith

  • Member
  • Joined in 2008
  • **
  • Posts: 1,989
    • View Profile
    • Donate to Member
Re: Bug in latest Linux gives untrusted users root access
« Reply #1 on: November 04, 2009, 11:50 AM »
Yup, I've read of it but comments like these sounds like it's a minor issue even for newbies like me who don't really understand anything:

As root type "sysctl vm.mmap_min_addr". If the result is 4096, the problem has been dealt with. If it is 0, read the man page for "sysctl.conf".

WINE is for running Windows programs on a Linux box, but it has limitations. Last time I read about it, WINE was unable to install or run Windows malware correctly.

Closed source drivers can cause some hassle (none in this case). If some kit provides so much benefit for you that it is worth the hassle, ask the supplier to provide a minimal open source wrapper around a binary blob like nVidia have for years.
« Last Edit: November 04, 2009, 11:55 AM by Paul Keith »

Dormouse

  • Supporting Member
  • Joined in 2007
  • **
  • Posts: 1,954
    • View Profile
    • Donate to Member
Re: Bug in latest Linux gives untrusted users root access
« Reply #2 on: November 04, 2009, 12:28 PM »
AFAIK, in default settings, it only affects RHEL. It is certainly being written up as a much bigger thing that it is for most users. 

Paul Keith

  • Member
  • Joined in 2008
  • **
  • Posts: 1,989
    • View Profile
    • Donate to Member
Re: Bug in latest Linux gives untrusted users root access
« Reply #3 on: November 04, 2009, 01:02 PM »
Just read the last comment now:

Just tested the "sysctl vm.mmap_min_addr" command on my Linux Mint box (not as root mind you - I'm no hacker so didnt want to risk a reg forums comment to root!)

Anyway, ot the response "vm.mmap_min_addr = 65536", not 4096.

So I guess it's fine and that therfore presumably ubuntu 9.04 (on which Mint 7 is based) is also ok.

Looks like this is a lot of fuss about nothing.

Good to see the attention Linux is getting though!