Skip to comments.
Linux Security Hole
via Slashdot ^
| 03/01/04
| Paul Starzetz
Posted on 03/07/2004 10:01:54 AM PST by Salo
Issue: ======
A critical security vulnerability has been found in the Linux kernel memory management code inside the mremap(2) system call due to missing function return value check. This bug is completely unrelated to the mremap bug disclosed on 05-01-2004 except concerning the same internal kernel function code.
(Excerpt) Read more at isec.pl ...
TOPICS: Technical
KEYWORDS: linux; lowqualitycrap; security
Navigation: use the links below to view more comments.
first 1-20, 21-38 next last
This is from a security bulletin linked at Slashdot.
1
posted on
03/07/2004 10:01:56 AM PST
by
Salo
To: rdb3; ShadowAce; B Knotts; Ernest_at_the_Beach
Pinging.
2
posted on
03/07/2004 10:02:59 AM PST
by
Salo
(You have the right to free speech - as long as you are not dumb enough to actually try it.)
To: Bush2000
Enjoy.
3
posted on
03/07/2004 10:03:19 AM PST
by
Salo
(You have the right to free speech - as long as you are not dumb enough to actually try it.)
To: John Robinson; B Knotts; stainlessbanner; TechJunkYard; ShadowAce; Knitebane; AppyPappy; jae471; ...
The Penguin Ping.
Wanna be Penguified? Just holla!

Got root?
4
posted on
03/07/2004 10:10:01 AM PST
by
rdb3
(The Servant of Jehovah is the Christ of Calvary and of the empty tomb. <><)
To: Salo
Looks like the latest 2.4 kernel (2.4.25 according to
kernel.org) is safe, but all previous ones, including some 2.6.x versions, are vulnerable.
5
posted on
03/07/2004 10:19:34 AM PST
by
lelio
To: lelio
I wonder if we can sue SCO for this....;-)
6
posted on
03/07/2004 10:23:59 AM PST
by
Salo
(You have the right to free speech - as long as you are not dumb enough to actually try it.)
To: Salo
Fortunately, this is a local exploit, and not a remote one.
Frankly, it's nearly imposible to secure a machine against someone who's sitting right there. It's also far less common for the attacker to have physical access to the box they want to hack.
To: shadowman99
It wouldn't appear to me that they need physical access to the box. They just need to have a local account. If you don't have users of questionable integrity this exploit isn't an issue. I'm not going to be worrying about this one on my home boxes as I figure I can generally trust my family not to do malicious things.
Z
8
posted on
03/07/2004 10:33:45 AM PST
by
zeugma
(The Great Experiment is over.)
To: Salo
This one is sorta old, and has already been fixed in the latest kernels AFAIK.
9
posted on
03/07/2004 12:30:03 PM PST
by
B Knotts
To: Salo
Well, now I'm not sure...I thought this was the one fixed in 2.4.25, but 2.4.25
is vulnerable, according to the bulletin. Yet, 2.6.3 is apparently not vulnerable.
I run the openwall patch on my Internet-exposed machines. Hopefully, it already had the fix in 2.4.25-ow1
10
posted on
03/07/2004 12:43:31 PM PST
by
B Knotts
To: Salo
I checked, and, yes, the openwall patch for 2.4.25 does fix this one.
11
posted on
03/07/2004 12:44:43 PM PST
by
B Knotts
To: shadowman99
Fortunately, this is a local exploit, and not a remote one.
That's nonsense. You're only
hoping that it's not a remote exploit:
"Since no special privileges are required to use the mremap(2) system call any process may use its unexpected behavior to disrupt the kernel memory management subsystem."
12
posted on
03/07/2004 2:42:12 PM PST
by
Bush2000
To: Bush2000
yeah - you might as well be using outlook for your email client....:-(
13
posted on
03/07/2004 5:14:25 PM PST
by
Salo
(You have the right to free speech - as long as you are not dumb enough to actually try it.)
To: Bush2000
"Proper exploitation of this vulnerability leads to local privilege escalation giving an attacker full super-user privileges." Go patch your firewall against Mydoom. The grown ups are having a talk.
To: shadowman99
Unless you've done a code review on every networked app that uses this API, you're full of crap. You're vulnerable.
15
posted on
03/08/2004 12:12:57 AM PST
by
Bush2000
To: Bush2000
Unless you've done a code review on every networked app that uses this API, you're full of crap. You're vulnerable.
More FUD from the FUDmeister. Your nickname should be Elmer.
Please, point out one single network aware application that would need to send user input to a memory remapping function. There would be none, because there would be no possible use for such a thing. The real risk with this bug is someone writing a specially crafted exploit program which runs as a normal user, performs the exploit, and allows the local user to assume UID(0) or EUID(0) or whatever.
16
posted on
03/08/2004 12:20:10 PM PST
by
adam_az
(Be vewy vewy qwiet, I'm hunting weftists.)
To: adam_az
Please, point out one single network aware application that would need to send user input to a memory remapping function. There would be none, because there would be no possible use for such a thing.
You're full of crap. You haven't code reviewed every networking app. You simply don't know whether anybody's using it. And, rather than do the heavy lifting, you just throw out the blanket assertion that "there would be no possible use for such a thing". Nice try. But your reassurances are worthless. Go hit the source trees -- then come back and tell me it's a non-issue. Until then, you're blowing smoke.
17
posted on
03/08/2004 3:44:22 PM PST
by
Bush2000
To: Bush2000
It's not a non-issue because you can prove that no network interaction can invoke a correctly incorrect call to the function. The blanket denial while not provable, is common sense.
It's a non-issue because it is already fixed.
18
posted on
03/08/2004 3:49:42 PM PST
by
Dinsdale
To: B Knotts
I thought this was the one fixed in 2.4.25, but 2.4.25 is vulnerable No, it isn't. Read the report carefully: 2.2.25 is vulnerable, 2.4.25 is not. Neither is 2.6.3.
19
posted on
03/08/2004 3:51:21 PM PST
by
Campion
To: Campion
Doh.
20
posted on
03/08/2004 3:56:07 PM PST
by
B Knotts
Navigation: use the links below to view more comments.
first 1-20, 21-38 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson