LinuxQuestions.org
Download your favorite Linux distribution at LQ ISO.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 10-24-2016, 06:46 PM   #31
philanc
Member
 
Registered: Jan 2011
Posts: 308

Rep: Reputation: 273Reputation: 273Reputation: 273

Quote:
Originally Posted by Darth Vader View Post
All servers running Slackware are with the pants down right now.

(...) And, please let's do not go zealots, as usual!
[Non-zealot mode on]

I don't get your statement regarding servers. If I understand correctly the vulnerability, it has to be triggered by a malicious executable, right?

I guess most servers don't (most of the time) run new software, obtained from unknown or dubious sources, right?

So, my understanding is that this vulnerability is more a threat for unmanaged desktops, typically the home PC where the admin-owner-user downloads and tests stuff from ...various places :-)

Did I miss something here?

Last edited by philanc; 10-24-2016 at 07:24 PM. Reason: typo
 
Old 10-24-2016, 07:37 PM   #32
slackb0t
Member
 
Registered: Apr 2005
Location: Canada
Distribution: Slackware64-current on Thinkpad Carbon X1
Posts: 264

Rep: Reputation: 63
Quote:
Originally Posted by philanc View Post
[Non-zealot mode on]

I don't get your statement regarding servers. If I understand correctly the vulnerability, it has to be triggered by a malicious executable, right?

I guess most servers don't (most of the time) run new software, obtained from unknown or dubious sources, right?

So, my understanding is that this vulnerability is more a threat for unmanaged desktops, typically the home PC where the admin-owner-user downloads and tests stuff from ...various places :-)

Did I miss something here?
It is a little more complicated. If you read the full article at the start of the other thread it explains the entire problem fairly well.

____

IMO the real question is not when will it be fixed (because honestly if anyone is overly concerned they should update their own kernel immediately and not wait for someone else to do it) but why was it swept under the rug for so many years. That part freaks me out a little because I honestly didn't think linux kernel developers would do such a thing... I am hoping I don't know the whole story and that there was good reason...

Last edited by slackb0t; 10-24-2016 at 07:38 PM.
 
1 members found this post helpful.
Old 10-24-2016, 08:06 PM   #33
philanc
Member
 
Registered: Jan 2011
Posts: 308

Rep: Reputation: 273Reputation: 273Reputation: 273
Quote:
Originally Posted by slackb0t View Post
Quote:
If I understand correctly the vulnerability, it has to be triggered by a malicious executable, right?
It is a little more complicated. If you read the full article at the start of the other thread it explains the entire problem fairly well.
Please help me understand what "is a little more complicated". I read the cited article (and several other describing the vulnerability in detail). I think that I understand the mechanism of the vulnerability.

What I also understand is that the vulnerability has to be triggered by a malicious executable, right?

Do you manage servers? do you assume that they already contain such a malicious executable? Or that they can load and execute one?
 
Old 10-24-2016, 08:44 PM   #34
slackb0t
Member
 
Registered: Apr 2005
Location: Canada
Distribution: Slackware64-current on Thinkpad Carbon X1
Posts: 264

Rep: Reputation: 63
Quote:
Originally Posted by philanc View Post
Please help me understand what "is a little more complicated". I read the cited article (and several other describing the vulnerability in detail). I think that I understand the mechanism of the vulnerability.

What I also understand is that the vulnerability has to be triggered by a malicious executable, right?

Do you manage servers? do you assume that they already contain such a malicious executable? Or that they can load and execute one?
Sorry.. I wasn't implying you didn't read or understand the article. I should have explained that part better.

I do manage a slackware server at a college. From what I understand a person with 'user' privileges sitting at a terminal could use this exploit. I will be 100 percent honest here and say that the more I read the more complicated and unlikely it seems...

There is also talk of other devices such as android phones possibly being exploited. Like I said I am only going by what I am reading and by no means an expert. It does look like it will be a headache for a lot of people in the coming weeks/months.
 
Old 10-24-2016, 08:58 PM   #35
Luridis
Member
 
Registered: Mar 2014
Location: Texas
Distribution: LFS 9.0 Custom, Merged Usr, Linux 4.19.x
Posts: 616

Rep: Reputation: 167Reputation: 167
Quote:
Originally Posted by slackb0t View Post
Sorry.. I wasn't implying you didn't read or understand the article. I should have explained that part better.

I do manage a slackware server at a college. From what I understand a person with 'user' privileges sitting at a terminal could use this exploit. I will be 100 percent honest here and say that the more I read the more complicated and unlikely it seems...

There is also talk of other devices such as android phones possibly being exploited. Like I said I am only going by what I am reading and by no means an expert. It does look like it will be a headache for a lot of people in the coming weeks/months.
I can't speak for this particular vulnerability. But, assuming someone is at a login prompt, has a target and a plan, they don't even need a login if they know what they're doing. If you're interested in a more complete understanding, this video is good.

https://youtu.be/tVG8e_Dneag
 
1 members found this post helpful.
Old 10-24-2016, 11:11 PM   #36
Richard Cranium
Senior Member
 
Registered: Apr 2009
Location: McKinney, Texas
Distribution: Slackware64 15.0
Posts: 3,858

Rep: Reputation: 2225Reputation: 2225Reputation: 2225Reputation: 2225Reputation: 2225Reputation: 2225Reputation: 2225Reputation: 2225Reputation: 2225Reputation: 2225Reputation: 2225
This is a better video https://www.youtube.com/watch?v=kEsshExn7aE

Sigh In my opinion, anyways.

Last edited by Richard Cranium; 10-24-2016 at 11:13 PM.
 
1 members found this post helpful.
Old 10-24-2016, 11:14 PM   #37
philanc
Member
 
Registered: Jan 2011
Posts: 308

Rep: Reputation: 273Reputation: 273Reputation: 273
Quote:
Originally Posted by slackb0t View Post
Sorry.. I wasn't implying you didn't read or understand the article. I should have explained that part better.

(...) There is also talk of other devices such as android phones possibly being exploited. Like I said I am only going by what I am reading and by no means an expert. It does look like it will be a headache for a lot of people in the coming weeks/months.
No big deal I was also pissed by how media can pick up one vulnerability among many and make big dramatic statements about it.

This one has many good ingredients: a catchy name, a fun logo, Linus let it go for 11 years, your toaster can be pwned at any time now, blah blah...

From the El Reg article cited in the the other thread:
Quote:
Unfortunately, builds of the vulnerable kernel at the heart of countless millions of routers, Internet-of-Things gadgets and other embedded devices remain vulnerable – and many will be difficult to patch. Most people won't even know they've got a security risk sitting next to them at home.
If a hacker can execute a malicious program in your home router, he is probably already root and don't need the exploit!

OTOH for Android, if the vulnerability works on it, it is a bigger deal. A rogue app, even with no or few permission, could root your phone... And not everybody did patch their Android kernel on October 21st
 
2 members found this post helpful.
Old 10-26-2016, 02:34 PM   #38
ryanpcmcquen
Member
 
Registered: Apr 2013
Distribution: DistroWanderer
Posts: 381

Rep: Reputation: Disabled
Quote:
Originally Posted by e5150 View Post
This sort of thing is the reason I don't outright recommend slackware, even though it's the only distribution I'd use myself for my main OS. I couldn't tell my arch-using brother to switch over if I'd have to add the caveat “Oh, and by the way, don't expect security patches in a timely manner, you'll have to check forums and the obfuscated kernel changelog and fix those things yourself”. As much as I want to view slackware as a system that you set-it-up-once-and-forget-about-it, it ain't, not until security updates are consistently provided. Preferably with a delay inversly correlated to the severity of the issue.
I've found Slackware to be very timely with security updates.
 
3 members found this post helpful.
Old 10-26-2016, 03:09 PM   #39
BratPit
Member
 
Registered: Jan 2011
Posts: 250

Rep: Reputation: 100Reputation: 100
This poor c0w is dead with unpatching kernel with Grsec

http://www.hostmat.eu/images/88573087560098853844.png

Two stopped exploits /PoC/ .
The first using PTRACE the second /proc/self/mem :-)
 
1 members found this post helpful.
Old 10-26-2016, 03:57 PM   #40
kikinovak
MLED Founder
 
Registered: Jun 2011
Location: Montpezat (South France)
Distribution: CentOS, OpenSUSE
Posts: 3,453

Rep: Reputation: 2154Reputation: 2154Reputation: 2154Reputation: 2154Reputation: 2154Reputation: 2154Reputation: 2154Reputation: 2154Reputation: 2154Reputation: 2154Reputation: 2154
Quote:
Originally Posted by 55020 View Post
Wordpress? Joomla? Drupal? They all have awful, terrible reputations for insecurity. Any fool knows that the only way to run Wordpress and stay sane is to have somebody else do it for you.
Among many other things, I'm running a few Wordpress installations for a few clients as well as for myself. I concur that a box running nothing is much more secure.
 
Old 10-26-2016, 08:31 PM   #41
ReaperX7
LQ Guru
 
Registered: Jul 2011
Location: California
Distribution: Slackware64-15.0 Multilib
Posts: 6,558
Blog Entries: 15

Rep: Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097
My $0.02... if you can't learn and do for yourself, such as build your own kernel, patch your own packages, then you have no business using any version of GNU/Linux as a user or administrator of any system or network.

So Patrick hasn't released a patch within Slackware yet Darth, you have the ability to do it yourself, as the old saying goes...

What's your point?
 
4 members found this post helpful.
Old 10-26-2016, 09:08 PM   #42
drgibbon
Senior Member
 
Registered: Nov 2014
Distribution: Slackware64 15.0
Posts: 1,220

Rep: Reputation: 942Reputation: 942Reputation: 942Reputation: 942Reputation: 942Reputation: 942Reputation: 942Reputation: 942
Quote:
Originally Posted by ReaperX7 View Post
My $0.02... if you can't learn and do for yourself, such as build your own kernel, patch your own packages, then you have no business using any version of GNU/Linux as a user or administrator of any system or network
Although I've upgraded my systems manually, I do think that a patch should be issued for this. It's just not something that you want lying around in your system. Interesting to note that grsec catches this one though.
 
4 members found this post helpful.
Old 10-26-2016, 09:59 PM   #43
Gordie
Member
 
Registered: Aug 2007
Location: Nolalu, Ontario, Canada
Distribution: Slackware64-Current
Posts: 871

Rep: Reputation: 364Reputation: 364Reputation: 364Reputation: 364
I am just an old man who likes computers and Linux. I have had no formal training and most of the time have no idea what I am doing BUT I just compiled and switched over to linux-4.4.27
Was able to compile kernels years ago but now recall nothing of that experience so had to start from scratch.
Thanks to Alien Bob for his instructions in the Slackware Book
 
4 members found this post helpful.
Old 10-27-2016, 05:14 AM   #44
ReaperX7
LQ Guru
 
Registered: Jul 2011
Location: California
Distribution: Slackware64-15.0 Multilib
Posts: 6,558
Blog Entries: 15

Rep: Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097
Quote:
Originally Posted by drgibbon View Post
Although I've upgraded my systems manually, I do think that a patch should be issued for this. It's just not something that you want lying around in your system. Interesting to note that grsec catches this one though.
Like anything the patch will come soon enough, but for now, anyone can do this themselves. You can wait for Patrick to add the patch officially, or you can add it yourself and not have to wait. Of course common sense should tell you, you should do it yourself.
 
Old 10-27-2016, 05:41 AM   #45
basica
Member
 
Registered: Nov 2011
Location: Australia
Distribution: Arch, LFS
Posts: 171

Rep: Reputation: 38
Quote:
Originally Posted by justwantin View Post
Perhaps you may also be uninformed about the difference between polite and informed questions and to arrogant demands.
I am from a similar part of the world (if they are indeed Romanian) and I can say that we are more direct which doesn't translate well into some other cultures where you need to be a bit more "flowery". Not saying the OP wasn't being demanding, or that this attitude would be appropriate otherwise but I generally give people the benefit of the doubt when they're from a different culture, speaking in a language that isn't their native tongue.
 
4 members found this post helpful.
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
[SOLVED] Preference: Drupal vs Joomla vs WordPress Train Linux - Server 6 04-28-2014 11:29 AM
LXer: Drupal, Joomla and WordPress face challenges in Germany LXer Syndicated Linux News 0 03-14-2012 03:50 PM
Guy got root directory access from my FTP server... how can I fix this? bripage Linux - General 16 10-02-2002 10:12 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 04:51 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration