Passes it's-not-crying-wolf test

Chat about Linux in general
Forum rules
Do not post support questions here. Before you post read the forum rules. Topics in this forum are automatically closed 6 months after creation.
Locked
lagagnon

Re: Passes it's-not-crying-wolf test

Post by lagagnon »

The above security threat relates to "sockets" and enterprise-class servers. As the vast majority of users here are personal workstation users with no ports open other than those absolutely necessary I don't think this is anything we should generally be concerned about.
Last edited by LockBot on Wed Dec 28, 2022 7:16 am, edited 1 time in total.
Reason: Topic automatically closed 6 months after creation. New replies are no longer allowed.
moodywoody

Re: Passes it's-not-crying-wolf test

Post by moodywoody »

lagagnon wrote:The above security threat relates to "sockets" and enterprise-class servers. As the vast majority of users here are personal workstation users with no ports open other than those absolutely necessary I don't think this is anything we should generally be concerned about.
While I agree that most users shouldn't be concerned about this, the vulnerability "affects all 2.4 and 2.6 kernels since 2001 on all architectures."

Source
DrHu

Re: Passes it's-not-crying-wolf test

Post by DrHu »

aged hippy wrote:Which is why i posted it, along with the "Worth being aware of" comment. :)
http://blog.cr0.org/2009/06/bypassing-l ... inter.html
--some explanation of the exploit available..

However I think it will likely be addressed in the next Linux kernel 2.6.3x; if they think it is serious enough of an issue
--it is not so strange that there is more than one entry door, whether applications on the desktop or as part of the default install or the kernel(s) themselves..

Remotely ..
  • In the realm of userland applications, exploiting them usually requires being able to somehow control the target's allocations until you get page zero mapped, and this can be very hard.
Locally exploiting..
  • Desktop Linux machines by default: pulseaudio. pulseaudio will drop privileges and let you specify a library to load though its -L argument. Exactly what we needed!

    Once we have one page mapped in the forbidden area, it's game over. Nothing will prevent us from using mremap to grow the area and mprotect to change our access rights to PROT_READ|PROT_WRITE|PROT_EXEC. So this completely bypasses the Linux kernel's protection.
User avatar
Acid_1
Level 5
Level 5
Posts: 796
Joined: Thu Nov 01, 2007 11:12 pm
Location: Saskatchewan, Canada

Re: Passes it's-not-crying-wolf test

Post by Acid_1 »

Awww. Beaten to the punch by two days. Oh well, here's a link the the OP if you want it:

http://blog.cr0.org/2009/08/linux-null- ... ue-to.html


and how to use it here:

http://forums.linuxmint.com/viewtopic.p ... 4&p=181154
Locked

Return to “Chat about Linux”