Root Exploit Vulnerability in Kernel 2.6.30
A recently discovered root exploit attacked the newest Linux versions and circumvented protection systems such as SELinux and AppArmor. A solution has been found.
An entry in the Internet Storm Center's Handler's Diary by Bojan Zdrnja entitled "A new fascinating Linux kernel vulnerability" describes the root exploit. The exploit code had been exposed by Brad Spengler, himself a developer for the grsecurity open source security application, in a "full-disclosure" on Grok.org. Zdrnja explains, "Why is it so fascinating? Because a source code audit of the vulnerable code would never find this vulnerability (well, actually, it is possible but I assure you that almost everyone would miss it). Spengler assures that only Kernel 2.6.30 and later are affected, with the exploit code running on 32-bit and 64-bit versions.
The security hole results from a vulnerability in the net/tun implementation. Even though the code correctly checks for a certain NULL variable, the compiler removes the if statement, thereby allowing access to otherwise inaccesible parts of memory. Zdrnja describes the "relatively easy" fix: "the check has to be done before assigning the value to the sk structure."
Thus the compiler introduces a vulnerability in the binary code that didn't exist in the source code, leading Zdrnja to the conclusion, "Fascinating research that again shows how security depends on every layer, and how even [a] very expensive source code audit can result in missed vulnerabilities."
ERRATA: Our original news indicated that Kernel 2.6.30 was previously released to customers primarily in a build for RHEL 5. We were wrong. The truth is that the exploit applies to Kernel 2.6.30 and later, as well as Kernel 2.6.18 in RHEL 5. The source code of the exploit, therefore, is compilable with different options. We apologize for our error.
Comments
comments powered by DisqusSubscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.
News
-
Two New Distros Adopt Enlightenment
MX Moksha and AV Linux 25 join ranks with Bodhi Linux and embrace the Enlightenment desktop.
-
Solus Linux 4.8 Removes Python 2
Solus Linux 4.8 has been released with the latest Linux kernel, updated desktops, and a key removal.
-
Zorin OS 18 Hits over a Million Downloads
If you doubt Linux isn't gaining popularity, you only have to look at Zorin OS's download numbers.
-
TUXEDO Computers Scraps Snapdragon X1E-Based Laptop
Due to issues with a Snapdragon CPU, TUXEDO Computers has cancelled its plans to release a laptop based on this elite hardware.
-
Debian Unleashes Debian Libre Live
Debian Libre Live keeps your machine free of proprietary software.
-
Valve Announces Pending Release of Steam Machine
Shout it to the heavens: Steam Machine, powered by Linux, is set to arrive in 2026.
-
Happy Birthday, ADMIN Magazine!
ADMIN is celebrating its 15th anniversary with issue #90.
-
Another Linux Malware Discovered
Russian hackers use Hyper-V to hide malware within Linux virtual machines.
-
TUXEDO Computers Announces a New InfinityBook
TUXEDO Computers is at it again with a new InfinityBook that will meet your professional and gaming needs.
-
SUSE Dives into the Agentic AI Pool
SUSE becomes the first open source company to adopt agentic AI with SUSE Enterprise Linux 16.

Confusion
RHEL 5?