Root Exploit Vulnerability in Kernel 2.6.30
A recently discovered root exploit attacked the newest Linux versions and circumvented protection systems such as SELinux and AppArmor. A solution has been found.
An entry in the Internet Storm Center's Handler's Diary by Bojan Zdrnja entitled "A new fascinating Linux kernel vulnerability" describes the root exploit. The exploit code had been exposed by Brad Spengler, himself a developer for the grsecurity open source security application, in a "full-disclosure" on Grok.org. Zdrnja explains, "Why is it so fascinating? Because a source code audit of the vulnerable code would never find this vulnerability (well, actually, it is possible but I assure you that almost everyone would miss it). Spengler assures that only Kernel 2.6.30 and later are affected, with the exploit code running on 32-bit and 64-bit versions.
The security hole results from a vulnerability in the net/tun implementation. Even though the code correctly checks for a certain NULL variable, the compiler removes the if statement, thereby allowing access to otherwise inaccesible parts of memory. Zdrnja describes the "relatively easy" fix: "the check has to be done before assigning the value to the sk structure."
Thus the compiler introduces a vulnerability in the binary code that didn't exist in the source code, leading Zdrnja to the conclusion, "Fascinating research that again shows how security depends on every layer, and how even [a] very expensive source code audit can result in missed vulnerabilities."
ERRATA: Our original news indicated that Kernel 2.6.30 was previously released to customers primarily in a build for RHEL 5. We were wrong. The truth is that the exploit applies to Kernel 2.6.30 and later, as well as Kernel 2.6.18 in RHEL 5. The source code of the exploit, therefore, is compilable with different options. We apologize for our error.
Comments
comments powered by DisqusSubscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.
News
-
UN Creates Open Source Portal
In a quest to strengthen open source collaboration, the United Nations Office of Information and Communications Technology has created a new portal.
-
Latest Linux Kernel RC Contains Changes Galore
Linux kernel 7.0-rc3 includes more changes than have been made in a single release in recent history.
-
Nitrux 6.0 Now Ready to Rock Your World
The latest iteration of the Debian-based distribution includes all kinds of newness.
-
Linux Foundation Reports that Open Source Delivers Better ROI
In a report that may surprise no one in the Linux community, the Linux Foundation found that businesses are finding a 5X return on investment with open source software.
-
Keep Android Open
Google has announced that, soon, anyone looking to develop Android apps will have to first register centrally with Google.
-
Kernel 7.0 Now in Testing
Linus Torvalds has announced the first Release Candidate (RC) for the 7.x kernel is available for those who want to test it.
-
Introducing matrixOS, an Immutable Gentoo-Based Linux Distro
It was only a matter of time before a developer decided one of the most challenging Linux distributions needed to be immutable.
-
Chaos Comes to KDE in KaOS
KaOS devs are making a major change to the distribution, and it all comes down to one system.
-
New Linux Botnet Discovered
The SSHStalker botnet uses IRC C2 to control systems via legacy Linux kernel exploits.
-
The Next Linux Kernel Turns 7.0
Linus Torvalds has announced that after Linux kernel 6.19, we'll finally reach the 7.0 iteration stage.

Confusion
RHEL 5?