LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 09-04-2009, 03:31 AM   #1
abefroman
Senior Member
 
Registered: Feb 2004
Location: lost+found
Distribution: CentOS
Posts: 1,430

Rep: Reputation: 55
New Linux Kernel Vulnerability


I received this on bugtraq, does anyone know what kind of exploit this is? Root access? DoS? Buffer Overflow?
And how serious is this exploit?

Here is what bugtraq had:
I've released an exploit for the Linux sock_sendpage() NULL pointer dereference[1], discovered by Tavis Ormandy and Julien Tinnes. This exploit was written to illustrate the exploitability of this vulnerability on Power/Cell BE architecture.
...
Linux kernel versions from 2.4.4 to 2.4.37.4, and from 2.6.0 to 2.6.30.4 are vulnerable.

The exploit was tested on:

* CentOS 5.3 (2.6.18-128.7.1.el5) is not vulnerable
* CentOS 5.3 (2.6.18-128.4.1.el5)
* CentOS 5.3 (2.6.18-128.2.1.el5)
...
* Red Hat Enterprise Linux 5.3 (2.6.18-128.7.1.el5) is not vulnerable
* Red Hat Enterprise Linux 5.3 (2.6.18-128.4.1.el5)
* Red Hat Enterprise Linux 5.3 (2.6.18-128.2.1.el5)
...
Best regards,
Ramon


The code is available here:
http://www.risesecurity.org/exploits/linux-sendpage.c

It doesn't look like a buffer overload, because I don't see any shell code.

TIA
 
Old 09-04-2009, 03:47 AM   #2
JulianTosh
Member
 
Registered: Sep 2007
Location: Las Vegas, NV
Distribution: Fedora / CentOS
Posts: 674
Blog Entries: 3

Rep: Reputation: 90
This would be considered a high priority/severity locally exploited bug allowing code execution at root level or crashing the kernel.

it's a null pointer dereference.

There might be some mitigating steps like blacklisting some modules.. still reading, but wanted first post! lol

Last edited by JulianTosh; 09-04-2009 at 03:53 AM. Reason: clarification
 
Old 09-04-2009, 05:45 AM   #3
H_TeXMeX_H
LQ Guru
 
Registered: Oct 2005
Location: $RANDOM
Distribution: slackware64
Posts: 12,928
Blog Entries: 2

Rep: Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301
There's already a patch out:
http://lwn.net/Articles/347006/
 
Old 09-04-2009, 07:24 AM   #4
AlucardZero
Senior Member
 
Registered: May 2006
Location: USA
Distribution: Debian
Posts: 4,824

Rep: Reputation: 615Reputation: 615Reputation: 615Reputation: 615Reputation: 615Reputation: 615
http://www.linuxquestions.org/questi...ations-747388/
 
Old 09-04-2009, 07:26 AM   #5
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by Admiral Beotch View Post
still reading, but wanted first post! lol
I'd like to remind you that that (even though meant jocularly) is not what posting in LQ Linux Security is about (or shouldn't be). We'd rather like to see people make informed posts instead of letting "first post" urges take over. Wrt quality this is not that kind of forum. Thanks for understanding.
 
Old 09-04-2009, 07:32 AM   #6
JulianTosh
Member
 
Registered: Sep 2007
Location: Las Vegas, NV
Distribution: Fedora / CentOS
Posts: 674
Blog Entries: 3

Rep: Reputation: 90
Speaking of being informative, how about next time you either 1) use smaller words, or 2) include definitions. Now I gotta go look up "jocularly".
 
Old 09-04-2009, 07:33 AM   #7
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by abefroman View Post
I received this on bugtraq, does anyone know what kind of exploit this is?
You received this on Bugtraq a few weeks ago.
We've had the discussion in this forum a few weeks ago.
As before please remind yourself to search LQ wrt efficiency et cetera.
Thanks for understanding.
 
Old 09-07-2009, 09:35 AM   #8
abefroman
Senior Member
 
Registered: Feb 2004
Location: lost+found
Distribution: CentOS
Posts: 1,430

Original Poster
Rep: Reputation: 55
Quote:
Originally Posted by unSpawn View Post
You received this on Bugtraq a few weeks ago.
We've had the discussion in this forum a few weeks ago.
As before please remind yourself to search LQ wrt efficiency et cetera.
Thanks for understanding.
Very sorry, it won't happen again.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
kernel null pointer vulnerability davidsrsb Slackware 2 08-14-2009 11:10 AM
LXer: Linux Kernel Vulnerability LXer Syndicated Linux News 0 04-09-2009 11:50 AM
kernel vulnerability ? erikhallsten Slackware 5 02-28-2008 12:28 PM
Linux Kernel Vulnerability jeremy Linux - Security 2 03-15-2005 02:03 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 03:56 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration