LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 04-20-2009, 01:26 PM   #1
2Gnu
Senior Member
 
Registered: Jan 2002
Location: Southern California
Distribution: Slackware
Posts: 1,880

Rep: Reputation: 51
udev Vulnerability


As described here, there's a nasty little hole in udev:
http://www.securityfocus.com/bid/34539

From what I've read and people I've spoken to, this vulnerability affects all 2.6 udev distros, not just those listed.

There's an exploit now, so I'm wondering:

1. Is it correct to think that this applies to Slackware?

2. If so, how's the patch coming along?

3. If not, why not?

Thanks.
 
Old 04-20-2009, 02:19 PM   #2
kentyler
Member
 
Registered: Dec 2008
Location: Newark Ohio
Distribution: Fedora Core
Posts: 270

Rep: Reputation: 38
That's a local exploit which may be an issue if you have local users. I'd think if you change the permissions to exclude local users/groups then it may be a bit more secure. IDK just a guess.
 
Old 04-20-2009, 03:25 PM   #3
2Gnu
Senior Member
 
Registered: Jan 2002
Location: Southern California
Distribution: Slackware
Posts: 1,880

Original Poster
Rep: Reputation: 51
I understand it's a local vulnerability, but since it allows a local user to gain root privileges, it's not a minor one.
 
Old 04-20-2009, 10:26 PM   #4
disturbed1
Senior Member
 
Registered: Mar 2005
Location: USA
Distribution: Slackware
Posts: 1,133
Blog Entries: 6

Rep: Reputation: 224Reputation: 224Reputation: 224
Quote:
Originally Posted by 2Gnu View Post
As described here, there's a nasty little hole in udev:
http://www.securityfocus.com/bid/34539

From what I've read and people I've spoken to, this vulnerability affects all 2.6 udev distros, not just those listed.

There's an exploit now, so I'm wondering:

1. Is it correct to think that this applies to Slackware?

2. If so, how's the patch coming along?

3. If not, why not?

Thanks.
http://www.milw0rm.com/exploits/8478

Try running that as a local user. I get permission denied - so maybe it doesn't apply - maybe the above script is flawed. I honestly have no clue.

The CVE is still under Candidate status. Gentoo, Ubuntu, RedHat have already released patches. Udev 141 (Apr - 08) doesn't apply here.
Slackware has 135 for -current and 12.2, 12.1 is using 118.

The openssl fiasco is still fresh in my mind
 
Old 04-20-2009, 11:28 PM   #5
2Gnu
Senior Member
 
Registered: Jan 2002
Location: Southern California
Distribution: Slackware
Posts: 1,880

Original Poster
Rep: Reputation: 51
Quote:
Originally Posted by disturbed1 View Post
Udev 141 (Apr - 08) doesn't apply here.
Slackware has 135 for -current and 12.2, 12.1 is using 118.
That may be the answer. Thanks.
 
Old 04-21-2009, 01:16 AM   #6
sahko
Senior Member
 
Registered: Sep 2008
Distribution: Slackware
Posts: 1,041

Rep: Reputation: Disabled
Quote:
Originally Posted by Slackware-current ChangeLog
a/udev-141-i486-1.tgz:
Upgraded to udev-141.
Changed serial devices from group 'uucp' to group 'dialout'.
This upgrade fixes a local root hole and a denial of service issue.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename...=CVE-2009-1185
http://cve.mitre.org/cgi-bin/cvename...=CVE-2009-1186
(* Security fix *)
Same for 12.2
 
Old 04-21-2009, 01:57 AM   #7
mRgOBLIN
Slackware Contributor
 
Registered: Jun 2002
Location: New Zealand
Distribution: Slackware
Posts: 999

Rep: Reputation: 231Reputation: 231Reputation: 231
Even better

New udev packages are available for Slackware 10.2, 11.0, 12.0, 12.1, 12.2,
and -current to fix security issues.

http://www.slackware.com/security/vi...ecurity.446399
 
Old 04-21-2009, 04:14 AM   #8
sahko
Senior Member
 
Registered: Sep 2008
Distribution: Slackware
Posts: 1,041

Rep: Reputation: Disabled
Quote:
Originally Posted by mRgOBLIN View Post
Even better

New udev packages are available for Slackware 10.2, 11.0, 12.0, 12.1, 12.2,
and -current to fix security issues.

http://www.slackware.com/security/vi...ecurity.446399
Yeah thats better, i dont follow security, since following -current makes it somehow obsolete.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
current users - udev-128 - don't forget rc.udev.new! tobyl Slackware 3 10-08-2008 03:28 AM
slackware-current, udev 0.96, and custom udev rules not working rignes Slackware 6 08-10-2006 03:43 AM
question about vulnerability el3ctronic Linux - Security 2 03-03-2005 07:44 PM
OpenBSD Vulnerability leeach *BSD 4 04-21-2004 02:01 AM
Vulnerability Scanner? AquamaN Linux - Software 8 07-22-2003 11:03 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 11:54 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration