Page 1 of 5 123 ... LastLast
Results 1 to 10 of 107

Thread: 8-year-old kernel security hole found

Hybrid View

  1. #1
    Join Date
    Feb 2008
    Location
    Missoula, MT, USA
    Beans
    Hidden!
    Distro
    Kubuntu 11.04 Natty Narwhal

    8-year-old kernel security hole found

    http://www.theregister.co.uk/2009/08...cal_linux_bug/
    Linux developers have issued a critical update for the open-source OS after researchers uncovered a vulnerability in its kernel that puts most versions built in the past eight years at risk of complete takeover.

    The bug involves the way kernel-level routines such as sock_sendpage react when they are left unimplemented. Instead of linking to a corresponding placeholder, (for example, sock_no_accept), the function pointer is left uninitialized. Sock_sendpage doesn't always validate the pointer before dereferencing it, leaving the OS open to local privilege escalation that can completely compromise the underlying machine. . . .

    "This passes my it's-not-crying-wolf test so far," said Rodney Thayer, CTO of security research firm Secorix. "If I had some kind of enterprise-class Linux system like a Red Hat Enterprise Linux...I would really go check and see if this looked like it related, and if my vendor was on top of it and did I need to get a kernel patch."
    Gotta figure new kernel updates coming into the repos, maybe as soon as tonight ...
    Direct complaints and/or flames to /dev/null for faster service.
    Everyone who chanted "Drill, baby, drill!" in 2008 now has to report to the coast of the Gulf of Mexico for oil-spill cleanup duty.

  2. #2
    Join Date
    Jul 2006
    Beans
    Hidden!

    Re: 8-year-old kernel security hole found

    Good.
    Open source doesn't have the benefit of 'security through obscurity'.
    Since the code is open for public scrutiny best practices must be followed and it makes for better software overall.

  3. #3
    Join Date
    Jun 2008
    Location
    Seattle, WA
    Beans
    195
    Distro
    Ubuntu 8.10 Intrepid Ibex

    Re: 8-year-old kernel security hole found

    Quote Originally Posted by Methuselah View Post
    Good.
    Open source doesn't have the benefit of 'security through obscurity'.
    Since the code is open for public scrutiny best practices must be followed and it makes for better software overall.
    Ah good point. A lot of FOSS people argue that there is no such thing as 'Security through obscurity' and FOSS is more secure because its open source, a lot more eyes read the code, somebody or the other would spot vulnerabilities and they would be fixed ..
    I think its a never-ending debate ..
    I think there is some sense in both arguments, neither is totally right IMO ..

  4. #4
    Join Date
    Nov 2005
    Location
    Bordeaux, France
    Beans
    11,292
    Distro
    Ubuntu 12.04 Precise Pangolin

    Re: 8-year-old kernel security hole found

    Quote Originally Posted by kernelhaxor View Post
    Ah good point. A lot of FOSS people argue that there is no such thing as 'Security through obscurity' and FOSS is more secure because its open source, a lot more eyes read the code, somebody or the other would spot vulnerabilities and they would be fixed ..
    I think its a never-ending debate ..
    I think there is some sense in both arguments, neither is totally right IMO ..
    It basically depends on who gets to read the code. The NSA, for example, have some of the world's best cryptographers behind their walls, so they can afford to keep their algorithms secret. The average company releasing closed source products, however, doesn't, so it would be foolish to buy their products and expect them to have a high level of security.

    Then again, open source isn't a guarantee of security either, as this thread demonstrates. Once again, it depends who gets to read the code. I don't mean to offend anyone, but I don't think thousands of Joe Averages make that much of a difference.
    Last edited by Bachstelze; August 14th, 2009 at 12:32 PM.
    「明後日の夕方には帰ってるからね。」


  5. #5
    Join Date
    Jan 2007
    Beans
    Hidden!

    Re: 8-year-old kernel security hole found

    Compared to Win and Mac, its really nothing.

    Dereferencing uninitialized pointer is worse than a null pointer because one can get valid address easily. Its poor programming and there is no excuse for it.

  6. #6
    Join Date
    Jun 2007
    Location
    VA
    Beans
    187
    Distro
    Ubuntu 10.04 Lucid Lynx

    Re: 8-year-old kernel security hole found

    Quote Originally Posted by Foster Grant View Post
    http://www.theregister.co.uk/2009/08...cal_linux_bug/


    Gotta figure new kernel updates coming into the repos, maybe as soon as tonight ...
    Great. This is not good for my server uptime. But security fixes are good.

  7. #7
    Join Date
    Dec 2006
    Location
    Australia
    Beans
    1,097
    Distro
    Xubuntu 15.10 Wily Werewolf

    Re: 8-year-old kernel security hole found

    Good thing they've found the error. Bad thing is this will give Linux's opponents ammunition about how using amateurs programmers and volunteers result in poor security, and how FOSS's community development model is not secure.

  8. #8
    Join Date
    Jun 2006
    Location
    Israel
    Beans
    292

    Re: 8-year-old kernel security hole found

    Quote Originally Posted by samjh View Post
    Good thing they've found the error. Bad thing is this will give Linux's opponents ammunition about how using amateurs programmers and volunteers result in poor security, and how FOSS's community development model is not secure.
    Because of one exploit that's been discovered? Microsoft has hired programmers to develop its products, yet many exploits are continously being discovered for them, even though the source is closed.

  9. #9
    Join Date
    Nov 2005
    Location
    Bordeaux, France
    Beans
    11,292
    Distro
    Ubuntu 12.04 Precise Pangolin

    Re: 8-year-old kernel security hole found

    The bug involves the way kernel-level routines such as sock_sendpage react when they are left unimplemented. Instead of linking to a corresponding placeholder, (for example, sock_no_accept), the function pointer is left uninitialized. Sock_sendpage doesn't always validate the pointer before dereferencing it, leaving the OS open to local privilege escalation that can completely compromise the underlying machine. . . .
    Someone should have paid more attention in C classes. That's really basic stuff: never leave a pointer uninitialized...
    「明後日の夕方には帰ってるからね。」


  10. #10
    Join Date
    Sep 2007
    Location
    over there
    Beans
    2,517
    Distro
    Ubuntu 12.04 Precise Pangolin

    Re: 8-year-old kernel security hole found

    Quote Originally Posted by HymnToLife View Post
    Someone should have paid more attention in C classes. That's really basic stuff: never leave a pointer uninitialized...
    That should be several someones. The dev who wrote the code, and the various eyes who reviewed the code before it went into the kernel.

    Still, never mind. I don't think anyone malicious has taken advantage of it in the past 8 years to bother a box. There's just a proof-of-concept attack, written by the vuln's discoverer Tavis Ormandy, and I don't think anything nasty will result from that as Linus has already written a patch. As long as every potentially vulnerable machine has that patch applied when it's released. Which is nicely taken care of round here by Ubuntu's Update Manager.
    "All people are scum. No matter what they look like." ~ Spider Jerusalem, Transmetropolitan #4
    blog photoblog


Page 1 of 5 123 ... LastLast

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •