Kernel Bug Lay Undiscovered for Eight Years
A Linux kernel bug in network socket initialization could allow an attacker to acquire root privileges to inflict damages. The security hole applies to all kernels of the 2.4 and 2.6 series and has been around possibly since 2001.
Source of the bug is a NULL pointer dereference caused by an incorrectly implemented function during socket initialization. Pointers should have redirected the function to a predefined stub routine, but some protocols leave these pointers uninitialized. The list of affected protocols is pretty long: Appletalk, IPX, X.25, IRDA, Bluetooth, ISDN, AX25, SCTP via IPv6 and IUCV, although there may be more.
The kernel validates the pointers before executing most of the relevant functions. However, it was found that the sock_sendpage() routine bybasses the validation and accepts the NULL pointer. An attacker can thereby inflict some damage with code on the first page executed with root privileges. A precondition, however, is that the attacker already has code modification privileges as user, which precludes any remote attack possibilities.
A few exploits were already prepared for the vulnerability, but a relevant kernel patch now exists in Git. Most distros should implement their own security patches for the affected protocols for their delivered kernel versions.
great postThanks a lot for sharing the article on cash. That's a awesome article. I enjoyed the article a lot while reading. Thanks for sharing such a wonderful article.I want to say very thank you for this great informations. now i understand about it. Thank you !
Naivete"t's been found, and it's been fixed. In addition it was never exploited, as it was never found until recently, had it been found earlier it would have been fixed earlier.
If on the other hand it had been known about and exploits available, and it had never been fixed,then there would be something to get upset about."
The comment above may be a bit naive? Just because it was not found by kernel developers until recently does not mean that the bug may not have been exploited.
WhyIt's been found, and it's been fixed. In addition it was never exploited, as it was never found until recently, had it been found earlier it would have been fixed earlier.
If on the other hand it had been known about and exploits available, and it had never been fixed,then there would be something to get upset about.
kernel typo - (I hope)
Uh, that applies to all kernels of the 2.4 - 2.6 series...
quote: "2.6, from 2.6.0 up to and including 18.104.22.168"
I hope this was just a typo, because leaving out that it affects the 2.6 series would be a large blunder.
Vendor D-Wave scores big with a sale to NASA's Quantum Intelligence Lab.
Many package updates and Steam integration highlight the latest from the Mandriva-based community Linux.
Richard Stallman calls for the W3C to remain independent of vendor interests.
The new release supports nine architectures, 73 human languages, and zero non-Free components.
Fedora developers release the first alpha version of Fedora 19, known as Schrödinger’s Cat, for general testing. The final release is expected in July 2013.
ack is a grep-like, command-line tool that has been optimized for programmers to search large trees of source code.
New features in SUSE Studio 1.3 include enhanced cloud integration, VM platform support, and lifecycle management.
The Linux Foundation recently announced that the Xen Project is becoming a Linux Foundation Collaborative Project.
Open source version of LiveCode is now available for developing apps, games, and utilities for all major platforms.
OpenDaylight is an open source software-defined networking project committed to furthering adoption of SDN and accelerating innovation in a vendor-neutral and open environment.