Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Linux Security Hole
via Slashdot ^ | 03/01/04 | Paul Starzetz

Posted on 03/07/2004 10:01:54 AM PST by Salo

Issue: ======

A critical security vulnerability has been found in the Linux kernel memory management code inside the mremap(2) system call due to missing function return value check. This bug is completely unrelated to the mremap bug disclosed on 05-01-2004 except concerning the same internal kernel function code.

(Excerpt) Read more at isec.pl ...


TOPICS: Technical
KEYWORDS: linux; lowqualitycrap; security
Navigation: use the links below to view more comments.
first 1-2021-38 next last
This is from a security bulletin linked at Slashdot.
1 posted on 03/07/2004 10:01:56 AM PST by Salo
[ Post Reply | Private Reply | View Replies]

To: rdb3; ShadowAce; B Knotts; Ernest_at_the_Beach
Pinging.
2 posted on 03/07/2004 10:02:59 AM PST by Salo (You have the right to free speech - as long as you are not dumb enough to actually try it.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bush2000
Enjoy.
3 posted on 03/07/2004 10:03:19 AM PST by Salo (You have the right to free speech - as long as you are not dumb enough to actually try it.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: John Robinson; B Knotts; stainlessbanner; TechJunkYard; ShadowAce; Knitebane; AppyPappy; jae471; ...
The Penguin Ping.

Wanna be Penguified? Just holla!

Got root?

4 posted on 03/07/2004 10:10:01 AM PST by rdb3 (The Servant of Jehovah is the Christ of Calvary and of the empty tomb. <><)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Salo
Looks like the latest 2.4 kernel (2.4.25 according to kernel.org) is safe, but all previous ones, including some 2.6.x versions, are vulnerable.
5 posted on 03/07/2004 10:19:34 AM PST by lelio
[ Post Reply | Private Reply | To 1 | View Replies]

To: lelio
I wonder if we can sue SCO for this....;-)
6 posted on 03/07/2004 10:23:59 AM PST by Salo (You have the right to free speech - as long as you are not dumb enough to actually try it.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Salo
Fortunately, this is a local exploit, and not a remote one.

Frankly, it's nearly imposible to secure a machine against someone who's sitting right there. It's also far less common for the attacker to have physical access to the box they want to hack.
7 posted on 03/07/2004 10:25:05 AM PST by shadowman99
[ Post Reply | Private Reply | To 1 | View Replies]

To: shadowman99
It wouldn't appear to me that they need physical access to the box. They just need to have a local account. If you don't have users of questionable integrity this exploit isn't an issue. I'm not going to be worrying about this one on my home boxes as I figure I can generally trust my family not to do malicious things.

Z

8 posted on 03/07/2004 10:33:45 AM PST by zeugma (The Great Experiment is over.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Salo
This one is sorta old, and has already been fixed in the latest kernels AFAIK.
9 posted on 03/07/2004 12:30:03 PM PST by B Knotts
[ Post Reply | Private Reply | To 1 | View Replies]

To: Salo
Well, now I'm not sure...I thought this was the one fixed in 2.4.25, but 2.4.25 is vulnerable, according to the bulletin. Yet, 2.6.3 is apparently not vulnerable.

I run the openwall patch on my Internet-exposed machines. Hopefully, it already had the fix in 2.4.25-ow1

10 posted on 03/07/2004 12:43:31 PM PST by B Knotts
[ Post Reply | Private Reply | To 1 | View Replies]

To: Salo
I checked, and, yes, the openwall patch for 2.4.25 does fix this one.
11 posted on 03/07/2004 12:44:43 PM PST by B Knotts
[ Post Reply | Private Reply | To 1 | View Replies]

To: shadowman99
Fortunately, this is a local exploit, and not a remote one.

That's nonsense. You're only hoping that it's not a remote exploit:
12 posted on 03/07/2004 2:42:12 PM PST by Bush2000
[ Post Reply | Private Reply | To 7 | View Replies]

To: Bush2000
yeah - you might as well be using outlook for your email client....:-(
13 posted on 03/07/2004 5:14:25 PM PST by Salo (You have the right to free speech - as long as you are not dumb enough to actually try it.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: Bush2000
"Proper exploitation of this vulnerability leads to local privilege escalation giving an attacker full super-user privileges." Go patch your firewall against Mydoom. The grown ups are having a talk.
14 posted on 03/07/2004 5:57:46 PM PST by shadowman99
[ Post Reply | Private Reply | To 12 | View Replies]

To: shadowman99
Unless you've done a code review on every networked app that uses this API, you're full of crap. You're vulnerable.
15 posted on 03/08/2004 12:12:57 AM PST by Bush2000
[ Post Reply | Private Reply | To 14 | View Replies]

To: Bush2000
Unless you've done a code review on every networked app that uses this API, you're full of crap. You're vulnerable.

More FUD from the FUDmeister. Your nickname should be Elmer.

Please, point out one single network aware application that would need to send user input to a memory remapping function. There would be none, because there would be no possible use for such a thing. The real risk with this bug is someone writing a specially crafted exploit program which runs as a normal user, performs the exploit, and allows the local user to assume UID(0) or EUID(0) or whatever.
16 posted on 03/08/2004 12:20:10 PM PST by adam_az (Be vewy vewy qwiet, I'm hunting weftists.)
[ Post Reply | Private Reply | To 15 | View Replies]

To: adam_az
Please, point out one single network aware application that would need to send user input to a memory remapping function. There would be none, because there would be no possible use for such a thing.

You're full of crap. You haven't code reviewed every networking app. You simply don't know whether anybody's using it. And, rather than do the heavy lifting, you just throw out the blanket assertion that "there would be no possible use for such a thing". Nice try. But your reassurances are worthless. Go hit the source trees -- then come back and tell me it's a non-issue. Until then, you're blowing smoke.
17 posted on 03/08/2004 3:44:22 PM PST by Bush2000
[ Post Reply | Private Reply | To 16 | View Replies]

To: Bush2000
It's not a non-issue because you can prove that no network interaction can invoke a correctly incorrect call to the function. The blanket denial while not provable, is common sense.

It's a non-issue because it is already fixed.
18 posted on 03/08/2004 3:49:42 PM PST by Dinsdale
[ Post Reply | Private Reply | To 17 | View Replies]

To: B Knotts
I thought this was the one fixed in 2.4.25, but 2.4.25 is vulnerable

No, it isn't. Read the report carefully: 2.2.25 is vulnerable, 2.4.25 is not. Neither is 2.6.3.

19 posted on 03/08/2004 3:51:21 PM PST by Campion
[ Post Reply | Private Reply | To 10 | View Replies]

To: Campion
Doh.
20 posted on 03/08/2004 3:56:07 PM PST by B Knotts
[ Post Reply | Private Reply | To 19 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-38 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson