LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 12-02-2003, 01:31 AM   #1
chort
Senior Member
 
Registered: Jul 2003
Location: Silicon Valley, USA
Distribution: OpenBSD 4.6, OS X 10.6.2, CentOS 4 & 5
Posts: 3,660

Rep: Reputation: 76
Linux kernel exploit in the wild


In case you haven't read slashdot...

The debian.org compromise was achieved by exploiting a kernel flaw with Linux. All Linux kernels prior to 2.4.23 or 2.6.0-test6 are vulnerable. Look for an updated kernel package or kernel source from your distro. Some distros (like Debian) are back-porting patches to earlier kernel sources.
 
Old 12-02-2003, 03:04 AM   #2
DavidPhillips
LQ Guru
 
Registered: Jun 2001
Location: South Alabama
Distribution: Fedora / RedHat / SuSE
Posts: 7,163

Rep: Reputation: 58
There went my uptime!
 
Old 12-04-2003, 03:50 AM   #3
dekket
Member
 
Registered: Oct 2003
Location: sweden
Distribution: debian
Posts: 47

Rep: Reputation: 15
Quote:
Originally posted by DavidPhillips
There went my uptime!
So did mine... damnit.. was closing the 100 day mark after the last power-out... hehe
 
Old 12-04-2003, 01:15 PM   #4
DavidPhillips
LQ Guru
 
Registered: Jun 2001
Location: South Alabama
Distribution: Fedora / RedHat / SuSE
Posts: 7,163

Rep: Reputation: 58
This one was busted down by the power company jacking around next door. a couple of months ago.

9:02am up 256 days, 23:58, 1 user, load average: 0.28, 0.06, 0.02
4:28am up 9 min, 1 user, load average: 1.21, 0.70, 0.36
4:03am up 1 day, 16 min, 1 user, load average: 1.77, 0.68, 0.24



here is where I rebooted for the new kernel.

4:04am up 58 days, 17 min, 0 users, load average: 1.42, 0.62, 0.23
4:03am up 19:35, 0 users, load average: 1.02, 0.42, 0.15
4:02am up 1 day, 19:34, 0 users, load average: 0.48, 0.11, 0.04
 
Old 12-04-2003, 01:30 PM   #5
Pcghost
Senior Member
 
Registered: Feb 2003
Location: The Arctic
Distribution: Fedora, Debian, OpenSuSE and Android
Posts: 1,820

Rep: Reputation: 46
So what's up with SuSE? I haven't found anything on their site for updating against this bug???
 
Old 12-04-2003, 05:46 PM   #6
Capt_Caveman
Senior Member
 
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658

Rep: Reputation: 69
They just posted to Bugtraq today:

-----BEGIN PGP SIGNED MESSAGE-----

______________________________________________________________________________


SUSE Security Announcement

Package: Linux Kernel
Announcement-ID: SuSE-SA:2003:049
Date: Thursday, December 4th 2003 15:30 MET
Affected products: 7.3, 8.0, 8.1, 8.2, 9.0
SuSE Linux Enterprise Server 7,
SuSE Linux Database Server,
SuSE eMail Server III, 3.1
SuSE Linux Firewall on CD/Admin host
SuSE Linux Office Server
SuSE Linux Desktop 1.0
SuSE Linux School Server
Vulnerability Type: local root exploit
Severity (1-10): 8
SUSE default package: yes
Cross References: CAN-2003-0961

Content of this advisory:
1) security vulnerability resolved:
- Linux kernel brk() integer overflow
problem description, discussion, solution and upgrade
information
2) pending vulnerabilities, solutions, workarounds:
- KDE
- mc
- apache1/2
- freeradius
- screen
- mod_gzip
- unace

3) standard appendix (further information)

______________________________________________________________________________


1) problem description, brief discussion, solution, upgrade
information

This security update fixes a serious vulnerability in the Linux
kernel. A missing bounds check in the brk() system call allowed
processes to request memory beyond the maximum size allowed for
tasks,
causing kernel memory to be mapped into the process' address
space.
This allowed local attackers to obtain super user privileges.

An exploit for this vulnerability is circulating in the wild, and
has been used to compromise OpenSource development servers.

There is no temporary workaround for this bug.

This update also fixes several other security issues in the
kernel

- race condition with files opened via O_DIRECT which could
be exploited to read disk blocks randomly. This could include
blocks of previously deleted files with sensitive content.
- don't allow users to send signals to kmod
- when reading the RTC, don't leak kernel stack data to user
space


SPECIAL INSTALL INSTRUCTIONS:
==============================
The following paragraphs will guide you through the installation
process in a step-by-step fashion. The character sequence
"****"
marks the beginning of a new paragraph. In some cases, you decide
if the paragraph is needed for you or not. Please read through all
of the steps down to the end. All of the commands that need to be
executed are required to be run as the superuser (root). Each step
relies on the steps before to complete successfully.


**** Step 1: Determine the needed kernel type

Please use the following command to find the kernel type that is
installed on your system:

rpm -qf /boot/vmlinuz

The following options are possible (disregarding the version and
build
number following the name, separated by the "-"
character):

k_deflt # default kernel, good for most systems.
k_i386 # kernel for older processors and chipsets
k_athlon # kernel made specifically for AMD Athlon(tm) family
processors
k_psmp # kernel for Pentium-I dual processor systems
k_smp # kernel for SMP systems (Pentium-II and above)

**** Step 2: Download the package for your system

Please download the kernel RPM package for your distribution with
the
name starting as indicated by Step 1. The list of all kernel rpm
packages is appended below. Note: The kernel-source package does
not
contain any binary kernel in bootable form. Instead, it contains
the
sources that the binary kernel rpm packages are made from. It can
be
used by administrators who have decided to build their own kernel.
Since the kernel-source.rpm is an installable (compiled) package
that
contains sources for the linux kernel, it is not the source RPM
for
the kernel RPM binary packages.

The kernel RPM binary packages for the distributions can be found
at these
locations below ftp://ftp.suse.com/pub/suse/i386/update/.
 
Old 12-04-2003, 07:28 PM   #7
moonloader
Member
 
Registered: Nov 2003
Location: linuxquestions.org
Distribution: Linux and BSD
Posts: 229

Rep: Reputation: 30
I think suse 9.0 kerneis 2.4.21
 
Old 12-04-2003, 09:34 PM   #8
Pcghost
Senior Member
 
Registered: Feb 2003
Location: The Arctic
Distribution: Fedora, Debian, OpenSuSE and Android
Posts: 1,820

Rep: Reputation: 46
The instructions are cool, but I am on a satellite connection so ftp is out unfortunately. Can I use the 2.4.23 kernel from kernel.org with the above instructions (except tar.bz2)? Unless someone knows where to get the RPM above via http.
 
Old 12-04-2003, 10:30 PM   #9
Pcghost
Senior Member
 
Registered: Feb 2003
Location: The Arctic
Distribution: Fedora, Debian, OpenSuSE and Android
Posts: 1,820

Rep: Reputation: 46
Nevermind, I found a brasilian mirror that uses http. Kewl new kernel here I come...
 
Old 12-04-2003, 11:18 PM   #10
synaptical
Senior Member
 
Registered: Jun 2003
Distribution: Mint 13/15, CentOS 6.4
Posts: 2,020

Rep: Reputation: 48
fyi, the slackware site says the 2.0 and 2.2 kernels are not vulnerable.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Kernel race condition exploit solution jlangelier Slackware 12 01-14-2005 10:15 AM
Kernel Crash-Exploit affects 2.4.2x and 2.6.x kernels on x86 and x86_64 unSpawn Linux - Security 8 11-24-2004 01:29 PM
My linux gone wild.... UnderGeorge Linux - Newbie 7 08-28-2004 06:31 PM
RH Linux process exploit? gt_swagger Linux - Security 5 07-06-2004 08:21 PM
i need PATCH that protect against local root exploit for kernel 2.2.19 Slackware veenrak Linux - Security 2 10-09-2002 09:23 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 01:02 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration