LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 02-10-2008, 05:02 PM   #1
Inuit-Uprising
LQ Newbie
 
Registered: Aug 2007
Distribution: Slackware 12.0
Posts: 22

Rep: Reputation: 15
Linux Kernel 2.6 Local Root Exploit by vmsplice?


I was just reading about this and apparently it has something to do with vmsplice. Some have suggested that you recompile the kernel without it. Does anyone know where the kernel option is? Does this issue even affect Slackware? Should I even worry about this? I would appreciate it if someone smarter than I could tell me if I should even care about this.
 
Old 02-10-2008, 05:21 PM   #2
leonscape
Senior Member
 
Registered: Aug 2003
Location: UK
Distribution: Debian SID / KDE 3.5
Posts: 2,313

Rep: Reputation: 48
Do you have more than one person using your machine? Will this person do something nasty and ry to get root access to do damage or change stuff?

Its a LOCAL root exploit not a remote exploit, so its local you have to worry about. and its kernel versions between 2.6.17 and 2.6.24.1 If you haven't got one of those kernels you've got nothing to worry about ( do a uname -r to find out the version ).

Plus so far we have a proof of concept, nothings been seen in the wild to expoit this... yet.
 
Old 02-10-2008, 07:41 PM   #3
Inuit-Uprising
LQ Newbie
 
Registered: Aug 2007
Distribution: Slackware 12.0
Posts: 22

Original Poster
Rep: Reputation: 15
I am the only one that uses this computer (as far as I know). So I'm not too worried about it. Thanks for your reply.
 
Old 02-11-2008, 07:33 AM   #4
leitao
LQ Newbie
 
Registered: Mar 2007
Posts: 4

Rep: Reputation: 0
Pre build packets could be found at:
http://134.2.34.20/blank/debian/linux-2.6/
as referenced in the debian mailing list http://lists.debian.org/debian-kerne.../msg00363.html

Take care,
Breno Leitao
 
Old 02-11-2008, 08:22 AM   #5
willysr
Senior Member
 
Registered: Jul 2004
Location: Jogja, Indonesia
Distribution: Slackware-Current
Posts: 4,661

Rep: Reputation: 1784Reputation: 1784Reputation: 1784Reputation: 1784Reputation: 1784Reputation: 1784Reputation: 1784Reputation: 1784Reputation: 1784Reputation: 1784Reputation: 1784
2.6.24.2 has been released to fix this
here's the changelog
Code:
commit 1617e66d11d6621824f642728d62f242272fd063
Author: Bastian Blank <bastian@waldi.eu.org>
Date:   Sun Feb 10 16:47:57 2008 +0200

    splice: fix user pointer access in get_iovec_page_array()
    
    patch 712a30e63c8066ed84385b12edbfb804f49cbc44 in mainline.
    
    Commit 8811930dc74a503415b35c4a79d14fb0b408a361 ("splice: missing user
    pointer access verification") added the proper access_ok() calls to
    copy_from_user_mmap_sem() which ensures we can copy the struct iovecs
    from userspace to the kernel.
    
    But we also must check whether we can access the actual memory region
    pointed to by the struct iovec to fix the access checks properly.
 
Old 02-11-2008, 11:00 AM   #6
MannyNix
Member
 
Registered: Dec 2005
Location: ~
Distribution: Slackware -current
Posts: 465

Rep: Reputation: 53
Quote:
Originally Posted by Inuit-Uprising View Post
Does anyone know where the kernel option is?
I was reading on gentoo's forums and they say:
Quote:
..there is no way to disable vmsplice in your .config .You can disable it quite easily by modifying the kernel source, open fs/splice.c, search for sys_vmsplice() and then make the following modification to the function
Here's the OP if still interested.
Good day
 
Old 02-13-2008, 04:32 AM   #7
lazylogic
Member
 
Registered: Aug 2006
Posts: 151

Rep: Reputation: 16
Quote:
Originally Posted by leonscape View Post
Do you have more than one person using your machine? Will this person do something nasty and ry to get root access to do damage or change stuff?

Its a LOCAL root exploit not a remote exploit, so its local you have to worry about. and its kernel versions between 2.6.17 and 2.6.24.1 If you haven't got one of those kernels you've got nothing to worry about ( do a uname -r to find out the version ).

Plus so far we have a proof of concept, nothings been seen in the wild to expoit this... yet.

Most of us who comes to forum for help probably would be using Linux for personnal use, so this exploit shouldn't worry us much.

However, if any experts around here can help to do a simple step by step howto to :
1. test out the exploit and
2. patch the affected kernel

it would really be a great learning exercise and definitely benefit a lot of forumers here
 
Old 02-13-2008, 06:21 AM   #8
jong357
Senior Member
 
Registered: May 2003
Location: Columbus, OH
Distribution: DIYSlackware
Posts: 1,914

Rep: Reputation: 52
Yea, it works. I don't see the point tho seeing as how there are more obvious ways to gain root access if your sitting at someones computer. That's definately quicker tho...
 
Old 02-13-2008, 09:01 AM   #9
shadowsnipes
Senior Member
 
Registered: Sep 2005
Distribution: Slackware
Posts: 1,443

Rep: Reputation: 73
For a lot of Slackware users that use the stock kernels, they can just install the newest package for their kernel and they don't need to patch anything.

See this other related thread for more information about all of this.
 
Old 02-13-2008, 09:41 AM   #10
hitest
Guru
 
Registered: Mar 2004
Location: Canada
Distribution: Void, Debian, Slackware
Posts: 7,342

Rep: Reputation: 3746Reputation: 3746Reputation: 3746Reputation: 3746Reputation: 3746Reputation: 3746Reputation: 3746Reputation: 3746Reputation: 3746Reputation: 3746Reputation: 3746
Smile

Quote:
Originally Posted by shadowsnipes View Post
For a lot of Slackware users that use the stock kernels, they can just install the newest package for their kernel and they don't need to patch anything.
Yeah, that's what I did. Here's a quote from the installation instructions from the slackware security e-mail.

Quote:
Installation instructions:
+------------------------+

Upgrade the appropriate package as root:
# upgradepkg kernel-generic-smp-2.6.21.5_smp-i686-2_slack12.0.tgz

Then, if you use lilo rerun it to update the boot loader.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
General capability of Linux kernel & Graphical environments to exploit multi core ? wini_g Linux - Software 7 11-16-2006 08:12 PM
Root exploit on 2.6.10. Kernel Anilraut Linux - Security 3 09-21-2006 02:59 PM
Linux kernel exploit in the wild chort Linux - Security 9 12-04-2003 11:18 PM
i need PATCH that protect against local root exploit for kernel 2.2.19 Slackware veenrak Linux - Security 2 10-09-2002 09:23 PM
WuFTPD strikes again - remote root exploit jeremy Linux - Security 0 11-29-2001 08:59 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 06:23 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration