Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

New zero-day flaw hits millions of Linux servers, also affects most Android devices
ZD Net ^ | January 19, 2016 -- 19:53 GMT | by Zack Whittaker

Posted on 01/20/2016 6:32:48 PM PST by Swordmaker

The flaw is said to affect "tens of millions" of Linux PCs and servers, and most modern devices running the latest Android KitKat 4.4 software and later.

A new, previously undiscovered flaw that allows an attacker to escalate local user privileges to the highest "root" level is said to hit "tens of millions" of Linux PCs and servers.

Because some of the code is shared, the zero-day flaw also affects more than two-thirds of all Android devices.

Israeli security firm Perception Point disclosed the flaw in a blog post Tuesday, but it wasn't immediately clear if the bug had been privately reported to Google, which develops the Android software.

Perception Point said in an email that it has released a proof-of-concept exploit following collaboration with a number of Linux distribution teams.

The flaw, said to date back to 2012, affects Linux kernel versions 3.8 and higher, which extends to devices running Android KitKat 4.4 and higher. The vulnerability is in the keyring facility, baked into the core of the Linux software. If exploited, an attacker would be able to execute code on the Linux kernel, and extract cached security data, which can include in some cases encryption and authentication keys.

The Israeli security firm said it had no evidence to suggest the flaw had been exploited in the wild.

A patch is expected to be released on January 19 for most Linux machines.

Red Hat has already patched its systems, according to a security advisory, with other distributions expected to follow up in the coming day.

It is not known if Google was aware of the bug before Perception Point published its findings. The Android maker will likely fix the bug as part of its scheduled monthly security updates in February.

A Google spokesperson did not comment.


TOPICS: Business/Economy; Computers/Internet
KEYWORDS: android; applepinglist; bsd; linux
Navigation: use the links below to view more comments.
first 1-2021-22 next last

1 posted on 01/20/2016 6:32:48 PM PST by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: ThunderSleeps; ShadowAce; dayglored; ~Kim4VRWC's~; 1234; Abundy; Action-America; acoulterfan; ...
If you use Linux, or Android this is for you. . . New ZERO DAY flaw including a proof of concept exploit that hits both Linux and Android that allows escalation to ROOT. Millions of Linux users and hundreds of millions of Android devices are vulnerable. Patches are available for Linux, but not so much for Android. Red Hat Linux already has a patch to close the flaw out, and other Linux distributions are expected quickly. Google is expected to fix it in February, but many Android devices cannot be updated and are subject to the carriers for update distribution, if they do at all. In the meantime, be careful. -- PING!

Pinging Shadow Ace, ThunderSleeps, and dayglored for their ping lists.


Android and Linux Security
Ping!

The latest Apple/Mac/iOS Pings can be found by searching Keyword "ApplePingList" on FreeRepublic's Search.

If you want on or off the Mac Ping List, Freepmail me

2 posted on 01/20/2016 6:40:14 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Since this is a privilege escalation attack, it can only be used by a user who already has a login, right? It is basically an internal threat from someone who is already valid on the server.


3 posted on 01/20/2016 6:42:43 PM PST by proxy_user
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Hardware designed by 100s of thousands X software generated by millions of code monkeys. What could go wrong, go wrong, go wrong.....?


4 posted on 01/20/2016 6:43:09 PM PST by Paladin2
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
Israeli security firm Perception Point disclosed the flaw in a blog post Tuesday, but it wasn't immediately clear if the bug had been privately reported to Google, which develops the Android software.

You would think that firms would contact the affected software manufacturers before blogging. Seems dumb not to.
5 posted on 01/20/2016 6:45:46 PM PST by PJBankard (It is the spirit of the men who leads that gains the victory. - Gen. George Patton)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Too many “back doors” are found in software and hardware. I think government agents have planted a lot of these things to use against U.S. and foreign computer users. Some through paying off the development company, some through maybe appealing to their “patriotism”, some through agents working in the industry. Too many found all the time to be accidental.


6 posted on 01/20/2016 6:46:11 PM PST by r_barton ("Trump" word origin "Triumph" - Merriam-Webster Dictionary)
[ Post Reply | Private Reply | To 1 | View Replies]

To: PJBankard
You would think that firms would contact the affected software manufacturers before blogging. Seems dumb not to.

I agree. They seem to have done so with the Linux community. Why not with Google and Android?

7 posted on 01/20/2016 6:47:36 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 5 | View Replies]

To: proxy_user
Since this is a privilege escalation attack, it can only be used by a user who already has a login, right? It is basically an internal threat from someone who is already valid on the server.

For Android users, it may be more of a problem. There was a sidebar article which pointed out that one-third of Android users don't bother with a passcode on their phones which would mean that if their phone were stolen, root would be accessible. But of course, with no passcode, everything would be open anyway. These are probably people who don't bother with passwords on their computers either, though.

Then on a shared computer system, anyone with a passcode could be a threat.

8 posted on 01/20/2016 6:51:20 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Swordmaker

I am talking about a genuine Linux server. Mine has two accounts, and I am the only one who knows the passwords. It’s an Ubuntu server, so there is no root account.


9 posted on 01/20/2016 6:54:27 PM PST by proxy_user
[ Post Reply | Private Reply | To 8 | View Replies]

To: PJBankard
You would think that firms would contact the affected software manufacturers before blogging. Seems dumb not to.

Re-reading the article, I suspect Google does know about the flaw. . . but Google/Alphabet is learning to keep press responses close to the vest like Apple does. Any response other than "No comment" can leave them open to legal action. Saying they are aware of the flaw might leave them open to lawsuits from disgruntled users who claim being damaged by the flaw because Android was not updated quickly enough. Saying they were unaware of the issue may trigger a lawsuit by disgruntled users claiming they should have created better software to protect their users and then KNOWN in advance about the flaw. Damned if they do and Damned if they don't. Silence is always legally better.

10 posted on 01/20/2016 6:56:47 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 5 | View Replies]

To: proxy_user
I am talking about a genuine Linux server. Mine has two accounts, and I am the only one who knows the passwords. It’s an Ubuntu server, so there is no root account.

Yeah, Ubuntu took a clue from Apple OS X and is set up without a ROOT user account activated. I wonder if this flaw would allow a standard administrator user to create a ROOT account in an Ubuntu Linux server? Do you know?

11 posted on 01/20/2016 6:59:43 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 9 | View Replies]

To: Swordmaker

I think they locked it up pretty tight. However, you can certainly get a root shell if you are an admin. This, however, is not recommended.


12 posted on 01/20/2016 7:02:25 PM PST by proxy_user
[ Post Reply | Private Reply | To 11 | View Replies]

To: proxy_user

“Since this is a privilege escalation attack, it can only be used by a user who already has a login, right? It is basically an internal threat from someone who is already valid on the server.”

It’s a moot point, it’s been fixed and the patch was available yesterday. Any linux user that pays any attention to his system security has already applied the patch.

I have a house full of linux boxes and they were patched as soon I got on my laptop yesterday morning.


13 posted on 01/20/2016 7:07:39 PM PST by Shadow Deamon
[ Post Reply | Private Reply | To 3 | View Replies]

To: Shadow Deamon

‘I have a house full of linux boxes and they were patched as soon I got on my laptop yesterday morning.”

Oops, it was actually this morning that I applied the patches, sorry.


14 posted on 01/20/2016 7:13:13 PM PST by Shadow Deamon
[ Post Reply | Private Reply | To 13 | View Replies]

To: Swordmaker

My phone is a phone. I do no banking or any of that stuff on it.

That said, I do access my email on it, so those passwords are vulnerable. So I should probably be a little more security oriented in that regard.


15 posted on 01/20/2016 7:19:20 PM PST by ChildOfThe60s (If you can remember the 60s, you weren't really there....)
[ Post Reply | Private Reply | To 8 | View Replies]

To: r_barton
Too many “back doors” are found in software and hardware. I think government agents have planted a lot of these things to use against U.S. and foreign computer users. Some through paying off the development company, some through maybe appealing to their “patriotism”, some through agents working in the industry. Too many found all the time to be accidental.

I was at a developer's soiree, long ago, and the discussion over drinks was backdoor security in e-money. One major e-money developer told me flatly that there literally was no value in marketing e-money without a government-accessible backdoor. And when I asked about user security, he just laughed.

16 posted on 01/20/2016 7:27:54 PM PST by Talisker (One who commands, must obey.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Talisker

I worked for HP for 30 years. The story going around the company during the 1st Gulf War (1991). It seems the CIA had planted a computer virus in the HP printer firmware on the printers the Iraqis were using in their government and military bases. They would clear the virus out of their PC’s but as soon as they turned on the printer again, the PC would be re-infected. Don’t know if they ever figured out were the virus was coming from that disabled their pc’s.

The government has its fingers in the computer industry since the beginning.


17 posted on 01/20/2016 7:44:42 PM PST by r_barton ("Trump" word origin "Triumph" - Merriam-Webster Dictionary)
[ Post Reply | Private Reply | To 16 | View Replies]

To: r_barton

I worked for the Burlington Northern Santa Fe and we found an HP printer on the network that had malware and was infecting other computers.


18 posted on 01/20/2016 8:39:35 PM PST by Dalberg-Acton
[ Post Reply | Private Reply | To 17 | View Replies]

To: Dalberg-Acton

They probably got a printer meant for Iraq. ;-)


19 posted on 01/20/2016 8:46:55 PM PST by r_barton ("Trump" word origin "Triumph" - Merriam-Webster Dictionary)
[ Post Reply | Private Reply | To 18 | View Replies]

To: rdb3; Calvinist_Dark_Lord; JosephW; Only1choice____Freedom; amigatec; Ernest_at_the_Beach; ...

Not a big deal, plus it's already been patched.

20 posted on 01/21/2016 4:55:57 AM PST by ShadowAce (Linux - The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-22 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson