Serious linux kernel vulnerability

News, happenings
Post Reply
Message
Author
User avatar
droope
Posts: 801
Joined: Fri 01 Aug 2008, 00:17
Location: Uruguay, Mercedes

Serious linux kernel vulnerability

#1 Post by droope »

This is a serious bug, it effects all Kernel versions released since May 2001! That goes all the way back to the early 2.4 versions.

It’s also exploitable according to the report – This issue is easily exploitable for local privilege escalation. In order to exploit this, an attacker would create a mapping at address zero containing code to be executed with privileges of the kernel (which I would assume to be root).

At least it only allows local priveledge escalation, if was a remote root exploit in the kernel..it would be a disaster.

A patch has been released, so if you have untrusted local users on your system UPDATE YOUR KERNEL NOW!

This is the second time this year there has been a serious exploit in the Linux Kernel, which in a way is good because it means people are looking at it critically.

The more bugs that get exposed, the more secure the Kernel and our operating systems become.
Source & more info:
http://www.darknet.org.uk/2009/08/serio ... /#comments
What seems hard is actually easy, while what looks like impossible is in fact hard.

“Hard things take time to do. Impossible things take a little longer.â€￾ –Percy Cerutty

[url=http://droope.wordpress.com/]Mi blog[/url] (Spanish)

User avatar
ecomoney
Posts: 2178
Joined: Fri 25 Nov 2005, 07:00
Location: Lincolnshire, England
Contact:

#2 Post by ecomoney »

I heard about this at Slashdot. Puppy users are already the most "privilidged" in linux-space, we run as root all the time. Would it effect, and how would it effect, Puppy users?
Puppy Linux's [url=http://www.murga-linux.com/puppy/viewtopic.php?p=296352#296352]Mission[/url]

Sorry, my server is down atm!

Post Reply