Linux 2.4.24 Release Fixes Root Vulnerability 436
diegocgteleline.es writes "Linux Kernel 2.4.24 has been released and is available on kernel.org. It seems there's a bug in the mremap(2) system call, where a local user can get root privileges.The new version has been released only with the most important bugs fixed - the rest of the changes have been postponed (those changes include the XFS filesystem)."
2.4.x? (Score:5, Funny)
Oh wait, it's been 2 weeks already,
TIME FOR A RECOMPILE!!
Re:2.4.x? (Score:5, Informative)
Re:2.4.x? (Score:4, Informative)
Re:2.4.x? (Score:5, Informative)
Re:2.4.x? (Score:2)
Article title misleading... (Score:5, Interesting)
Re:Article title misleading... (Score:5, Informative)
s!
Re:Article title misleading... (Score:5, Funny)
You are dangerously close to making me believe that a slashdot editor both reads the site and actually takes action based on it. This is distorting my worldview, and most halt.
plfxthx.
Re:Article title misleading... (Score:2, Redundant)
Re:Article title misleading... (Score:5, Informative)
its been in the kernel since the 2.2 days .. the 2.2 series kernel's are also affected.
read the synopsis: here [isec.pl]Re:Article title misleading... (Score:2)
Re:Article title misleading... (Score:2)
Re:Article title misleading... (Score:5, Funny)
Parent: +5 FUNNY (Score:2)
Ahhahahahaha... that's FUNNY!
Re:How do you patch? (Score:5, Informative)
Okay:
Hope that helps!
Anyone written an exploit yet? (Score:4, Interesting)
In other words, should I, Joe Schmoe SysAdmin be afraid of the script kiddies yet?
Re:Anyone written an exploit yet? (Score:5, Interesting)
As soon as an exploit is publicised, yes you should.
Since it's a local exploit it's not as bad as it could be, but I guarantee you if a rootkit didn't already exist, once is being worked on now.
If you trust all your open services to not execute foreign code you can probably doze a bit, but that's walking on a razor's edge.
*raises eyebrow* (Score:3, Insightful)
Isn't that an oxymoron?
Well, it should be.
Re:Anyone written an exploit yet? (Score:3, Informative)
Just because the proof of concept exploit was created DOESN'T MEAN IT WAS RELEASED! If Linus and one other guy are the only ones with the proof of concept exploit, there is no reason to fear the script kiddies yet.
They did NOT say if the reason for the fix was because someone released an exploit, or if the reason for the exploit is simply to prove the vulnerability works, and was not public
Re:Anyone written an exploit yet? (Score:3, Insightful)
No, but it means the exploit is valid and worth patching. Its not like a lack of code in the wild means the script kiddies don't have it, just that they're good at hiding it. If sysadmins of the world knew how long some ssh exploits were private.. scarey world.
I'm assuming you're more of a win
Re:Anyone written an exploit yet? (Score:3, Insightful)
I always end up rebooting manually, on glibc, ldd, and kernel security fixes. Generally pam changes too. Those are libraries that get sucked into early binaries and never get restarted. I suppose I could reboot into single user mode for everything but the kernel, but a reboot is a good idea anyways.
Kirby
Changelog (Score:5, Informative)
(no subject) (Score:4, Funny)
Well... (Score:2, Interesting)
Also, is Linux more secure than Windows, because I hear a fair amount of Linux security holes more than Windows, or maybe I'm just not perceptive enough.
Re:Well... (Score:2, Insightful)
They only reason you don't hear about them so often anymore, is the fact that they recently changed from a weekly patch release cycle, to a monthly patch release cycle.
That, and Automatic Updates.
Re:Well... (Score:5, Insightful)
Re:Well... (Score:5, Informative)
All advanced operating systems can be insecure depending on configuration.
However, regarding your specific question, you see more security exploits for Linux probably because Linux has both remote and local exploits; the vast majority are local exploits. A local exploit is usually only a concern in a multiuser mainframe-style environment where you have "trusted" users who can log in to the machine. These users can log in and use a local exploit to elevate their priviliges on the machine. If the user doesn't have a login account, they do not have the opportunity to perform the exploit. Local exploits generally use buffer overflows or hijack split-second temp files to do their nastiness.
Windows generally does not operate in a multiuser fashion, so these exploits are not as pertinent. Having written Windows software for years, I can tell that if local exploits ever become a concern for Windows (e.g. if Windows ever goes multiuser in a big way, where a local user may want to exploit the machine), almost every Windows application will have big problems with local exploits, since they have been built assuming that the local system is single-user and temp files and registry entries are assumed to be safe.
Even the multi-user functions of today... (Score:5, Insightful)
That users created at install time default to admins with no passwords only goes to prove that even more. Which is fine, as long as a) noone unauthorized can get to the machine and b) all the users trust eachother.
On the other hand, local exploits are a grave concern in many settings, say for example a university where each student has a local account. So they should by no means be taken lightly, even if they don't produce worms.
Kjella
Re:Well... (Score:3, Interesting)
A local exploit would be an exploit somebody sitting at a shell, or at the keyboard of the system itself, could use to elevate prividiledges he already has.
Imagine this local exploit: A program, that runs as root, creates a temporary file in
Apparently Inquirer worse than brain dead monkey (Score:3, Interesting)
Arrgh! Not more people who just count the number of vulnerabilities! I just skimmed that article, but it looks like crap to me. Standard Microsoft trolling, nothing else.
Don't listen to anyone who claims something is more secure based on the number of vulnerabilties. I bet if you look at all the "vulnerabilities" counted for Debian, most of them were for crap you'll never use (they seem to have every single little open source project ever made) or something stupid like "users can manipulate the high score
Nice (Score:2, Insightful)
Quick! (Score:5, Funny)
Re:Quick! (Score:2, Flamebait)
Ugh, a BSD troll. How come these guys are tolerated?
Re:Quick! (Score:2)
patch is very small - about 2K compressed (Score:2, Informative)
patch -p1 < patch-2.4.24
make clean dep
make bzImage modules_install
Depending on your situation, configure your boot loader - grub or lilo - to recognize the new image.
XFS Filesystem (Score:5, Funny)
It's XFS. NOT XFS Filesystem. I'm gonna do something illegal to the next person that says ATM machine, too.
Re:XFS Filesystem (Score:5, Funny)
Re:XFS Filesystem (Score:2)
Re:XFS Filesystem (Score:5, Funny)
Most annoying acronyms:
a) NIC card
b) Compact Disk disk
c) VIN number
d) ATM machine
e) Cowboy Neal Neal
Re:XFS Filesystem (Score:3, Funny)
Shouldn't that be heads would be crashing? (duck. run.)
Re:XFS Filesystem (Score:3, Insightful)
Re:XFS Filesystem (Score:5, Funny)
Isn't that the thing where you type in your PIN number?
Re: (Score:2)
Re:XFS Filesystem (Score:3, Funny)
Isn't that the thing where you type in your PIN number?
PIN number is quite a mouthful. I usually abbreviate it `PINN'.
Re:XFS Filesystem (Score:3, Funny)
That's not very descriptive to me though. To help, why not make it PINN Number?
Re:XFS Filesystem (Score:3, Insightful)
Re:XFS Filesystem (Score:4, Funny)
Re:XFS Filesystem (Score:2)
Re:XFS Filesystem (Score:2)
Re:XFS Filesystem (Score:4, Funny)
"ATM Machine".
Okay... what are you gonna do to me?
Re:XFS Filesystem (Score:4, Funny)
Re:XFS Filesystem (Score:2)
Then I guess somebody's going to have to call in the SWAT team...
Re:XFS Filesystem (Score:2)
I don't know what you thought SWAT stood for, but none of the words are "team".
Re:XFS Filesystem (Score:2, Informative)
Re:XFS Filesystem (Score:3, Informative)
No, that's the sanitized version of the acronym. SWAT originally meant Special Weapons Attack Team [google.com], but the acronym was quickly changed, probably for reasons of political correctness, to "Special Weapons and Tactics."
Similarly to how they renamed the NMR machine to MRI, because people didn't feel comfortable stepping into a nuclear magnetic resonance device.
Anyway, "SWAT team" is redundant.
Re:XFS Filesystem (Score:4, Informative)
I'd say you've got the accepted definition.
Re:XFS Filesystem (Score:3, Insightful)
It's the filesystem named "XFS". Or, to put it another way, the XFS file system.
Re:XFS Filesystem (Score:3, Interesting)
Re:XFS Filesystem (Score:2)
Re:XFS Filesystem (Score:2)
Re:XFS Filesystem (Score:2)
This is why I love free (as in beer) software... (Score:3, Funny)
Re:This is why I love free (as in beer) software.. (Score:2, Troll)
Can't Wait! (Score:3, Insightful)
Is this just more proof that Linux was built by amateurs? Or wait - I know - that Linux can't be trusted because the source code is open.
Now, for those who think I'm serious, think about it for a moment. Slashdot hypes up every single MS vulnerability as "proof" that MS systems are inherently insecure. And I wouldn't disagree that MS systems are insecure. But discovering a single (or a few) vulnerability doesn't make an OS insecure.
What it comes down to is vigilance and design. The numerous security holes in MS products are a result of bad design, not merely a mistake or two. And this is the big difference between this vulnerability - a mere isolated mistake - and Microsoft's complete lack of engineering which ensures that their software _will_ have security holes.
Okay, flame away Microsofties!
Re:Can't Wait! (Score:3, Insightful)
Even with Linux's problems, I'll take it any day over MS OSes. At least Linux developers are honest about their mistakes.
Re:Can't Wait! (Score:3, Interesting)
I'm still convinced that a closed-source competently-designed operating system will be, on the whole, less vulnerable than an open-source competently-designed operating system. The theoretical million eyes on the source isn't worth as much as it (used to be) hyped, because you're not talking about a million security professionals and you're really
Re:Can't Wait! (Score:2)
Read the paper Security in Open versus Closed Systems -- The Dance of Boltzmann, Coase and Mo [cam.ac.uk]
Re:Can't Wait! (Score:3, Insightful)
I remember an exploit in the apache code that when they received an image that was bigger then there buffered they doubled the size of the buffer (ONCE!). (This was in November, not sure if they fixed it).
I think this should just make the Linux and Microsoft and whatever communities be more humble and stop some of these flame wars.
Linux/Unix/Microsoft all have their ad
Re:Can't Wait! (Score:2)
It's a little hard to resist the urge to say "See! Linux has problems too!" when every story involving Microsoft on Slashdot is spun out of proportion.
Re:Can't Wait! (Score:2)
Dare to explain why they are bad design and not coding mistakes in Windows case ?
Bad Design (Score:2)
Re:Can't Wait! (Score:4, Insightful)
So doesn't it stand to reason then that the 'Microsoft Trolls' are simply giving you a taste of your own medicine? If Slashdot weren't out to sensationalize Microsoft at every turn, you wouldn't have to deal with 'Microsofties' forcing you to eat a bit of humble pie when these things come along.
In short: People in glass houses...
"Bugs"? (Score:3, Insightful)
Anybody with any rudimentary knowledge knows that this is about the worst possible thing they could say. They did not even say "Local Root Vulnerability" which they could have.
Argh, just finished 2.4.23 went back from 2.6 (Score:2, Interesting)
I tried 2.6.1rc1 and with the -mm patch. Same thing. So now I'm back with 2.4.3. But in last few versions of the 2.4 series I get extreme slowdowns whe
Re:Argh, just finished 2.4.23 went back from 2.6 (Score:2, Insightful)
Nice values *really* make a difference in 2.6
Re:Argh, just finished 2.4.23 went back from 2.6 (Score:2, Interesting)
Re:Argh, just finished 2.4.23 went back from 2.6 (Score:4, Insightful)
On kernel 2.4 and earlier, you usually gave the X-server a negative nice-value to give it higher priority which lead to somewhat better responsivness. But the 2.6-kernel has a new rewritten scheduler (?) that detects if the process is interactive or not and handle them differently to make interactive apps more responsive while giving non-interactive apps more throughput. By renicing the X-server you foul the kernel to not make use of this and thus get a much less responsive X desktop.
If you just compiled and installed the 2.6 kernel on a 2.4 distro that is not 2.6-ready you'll have to mock with the X startup-scripts to remove the nice/renice-stuff to make use of the great 2.6 desktop-features.
Re:Argh, just finished 2.4.23 went back from 2.6 (Score:3, Insightful)
Redhat 7.3 updates? (Score:2)
Ok, I know that I have read here that a few groups are making new updates for RedHat 7.3, but now I can't remember which story or groups. Anybody remember which story that was. As I recall one group was going to charge $5/machine and another was going to do it for free. I don't think that Fedora Legacy ever got around to supporting the old RedHat stuff, or did they?
Re:Redhat 7.3 updates? (Score:3, Interesting)
RHN has new kernels for RH 7.1 to RH 8.0 (Score:4, Informative)
RedHat fixed orphaned versions (Score:5, Informative)
Kernel patches as modules? (Score:5, Interesting)
I remember, back when the last ptrace bug was found, some kind soul created a kernel module that (a) renamed the current ptrace function to something else and (b) implemented a new wrapper function that first checked to see if you were root, before deciding whether to call the old ptrace. Slick!
I'm surprised this sort of workaround hasn't been done for other kernel bugs. It seems it wouldn't even have to be a workaround. A module could actually provide a new, repaired version of the buggy routine. Couldn't it?
I can imagine insmoding a list of "kernel-fix" modules at boot time. Then, every once in a while , I'd upgrade my machines to a new kernel, but without the urgency of getting a new kernel installed RIGHT NOW! to fix a small (code-wise) security problem.
Re:Kernel patches as modules? (Score:4, Informative)
Modules (or really any third-party code regardless of method be it /dev/kmem or modules or whatever) having access to the syscall table of a running kernel is (1) evil, (2) nonportable - it won't work on many of our architectures, and (3) likely to become even harder as the kernel gurus try to defeat people doing stupid things like this.
BTW, this also affects things like (why would you need this?) realtime virus scanners that hook syscalls. Please, don't do this. If the argument is that you need the machine to stay up because it's too important to reboot for a patch, then you definitely should not be inserting modules that *intentionally overwrite important chunks of kernel memory* because if there's the slightest thing wrong, your machine will either crash or begin to do bizarre things. You could end up with data corruption and/or loss for an extended period before you even realize it. Do not do this. It is not what you want. Believe me.
Mod parent back up please (Score:2, Insightful)
My experience with Linux is the same as the parent poster's: patching, patching, patching if you're up-to-date with the latest 2.x version, or running a kernel from 3 years ago if you prefer stability to tinkering.
Re:Mod parent back up please (Score:3, Insightful)
Re:Mod parent back up please (Score:2)
If he would've said a month uptime between reboots then I would agree. The 2.4.23 release came out at the end of November to fix a major kernel root exploit (do_brk) and now 2.4.24 is coming out about a month later to fix another major kernel root exploit. This isn't a very good track record to present to potential customers/users. I'm sick of rebooting my Linux boxes to load new
Re:Mod parent back up please (Score:3, Informative)
The recent patches are only really important if you run a multi-user system and don't trust your users.
Re:Mod parent back up please (Score:2)
Re:Mod parent back up please (Score:2)
but I did run linux 2.2 and 2.4 for a year or two, and in my experience (did you hear that, AC garbage?) I had to patch every few weeks to keep crackers out.
then I went back to NetBSD (the first Unix I had ever used, on a Mac SE/30) and never looked back. it does not crash, period, unless there is a hardware failure or power outage. Linux crashed infrequently, but NetBSD has crashed once for me in a combined six years of constant use. NetBSD runs what I need it t
Re:Mod parent back up please (Score:2, Insightful)
Linux is great fun for personal computers - but I highly recomend that people looks at NetBSD, FreeBSD and OpenBSd for server use.
They went throught the same problems that Linux is going through right now... but that was about 7 years ago and have moved on.
There stable, secure and robust - the perfect atributes for a server or even pesonal use if you value productivity over features.
Re:Mod parent back up please (Score:4, Insightful)
Software is written by humans, and humans make errors, so software has bugs.
All software.
The sysadmin motto (abridged) is 'all software sucks, all hardware sucks'
I just looked through the bugtraq archives, and found 3 local root exploits for OpenBSD in the year 2003. That's the same class of problem as was found in Linux.
Security is a mindset, and a practice. It's not a platform.
Re:HOW DO I KNOW WHAT VERSION I'M RUNNING? (Score:3, Informative)
Re:Not another one (Score:3, Funny)
Re:Not another one (Score:5, Funny)
how long does it take you to prepare a kernel-upgrade?
Re:Not another one (Score:2)
But that's not the real problem. (Score:4, Interesting)
In Windows, you just install a small binary patch that takes less than a minute.
A few months later when/if they get around to releasing the small binary patch. B-)
But there IS a real problem - at least as of the last version of RedHat I installed. (And I'm presuming the same is true with other "commercial-grade" distros, so somebody PLEASE let me know if there's one where this is NOT true.)
In Linux the commercial distributions make it easy to do an initial install - once. But the included documentation doesn't tell a newbie how to compile and install a new kernel. Or how to download a kernel patch (unless, MAYBE, if he figures out it might be needed and digs deep and hard for it).
With Red Hat:
- The install tools are all directed at getting him from bare (or windows-loaded) machine to login prompt.
- The phone support included with the distro (before the recent policy changes at least) stops when you get installed to where you have a login prompt.
- The admin tools are essentially all directed at tuning that initial install. (Exception is rpm - with some of the most convoluted manual pages I've seen in a long time. But even that leaves him in the same position as a Windows user - waiting for an RPM patch.)
Source included but NO documentation on how to build from source. The nicey-nice admin tools make it worse, by hiding what's going on from the user so he has NO clue what's going on behind the pretty GUIs.
I'll believe Linux is ready for prime-time when the distro documentation includes:
- A keystroke-by-keystroke walkthrough of applying a patch.
- A keystroke-by-keystroke walkthrough of building and installing a distribution-equivalent kernel from source (so the user has a trusted baseline from which to make ONLY the changes he intended).
- Explanations of the configuration-file twiddling done by the admin tools - broken down by GUI page.
Anything less leaves him in a position much like a windows user - dependent on the vendor or a consultant. Unable to make his own changes (beyond config-tool knob-twiddling) without a long learning process (much like becoming a MSCE) because any change he makes might shatter his configuration beyond his own ability to recover (short of a reinstall from scratch).
Yes, with Linux you can learn this stuff without having to go buy a monopoly's school supplies. But at least Microsoft understands that a user has other things to do than become a guru. Linux distro providers and hackers, on the other hand, seem to have forgotten the learning curve they climbed.
Linux is still in the model-T / hot-rodder stage. Versus, say, Microsoft, which has advanced to black-box engine control / recall and dealer-fix stage. (Except that the recalls are too few and too often not-free. Unlike the "big three" plus foreign compeition, a dissatisfied customer can't dump the latest in a series of lemons and switch to a competitor's functionally-equivalent peach.)
Re:In Linux... (Score:4, Insightful)
Re:Where to get it (Score:2)
Re:Debian, Gentoo, and who else? (Score:2)