Forums

Skip to content

Advanced search
  • Quick links
    • Unanswered topics
    • Active topics
    • Search
  • FAQ
  • Login
  • Register
  • Board index Discussion & Documentation Gentoo Chat
  • Search

[NEWS] Kernel security exploits: Upgrade ASAP

Opinions, ideas and thoughts about Gentoo. Anything and everything about Gentoo except support questions.
Post Reply
  • Print view
Advanced search
45 posts
  • 1
  • 2
  • Next
Author
Message
dberkholz
Retired Dev
Retired Dev
User avatar
Posts: 1008
Joined: Tue Mar 18, 2003 6:51 am
Location: Minneapolis, MN, USA
Contact:
Contact dberkholz
Website

[NEWS] Kernel security exploits: Upgrade ASAP

  • Quote

Post by dberkholz » Wed Feb 13, 2008 8:31 pm

This forums thread is for discussion of the www.gentoo.org posting, "Kernel security exploits: Upgrade ASAP." Post your comments and suggestions here.
Two major security flaws in the Linux kernel were reported last weekend. Both flaws have the same impact (root access for local users) and both exist within the vmsplice() system call, which was added to the kernel in 2.6.17. There is no configuration option to exclude vmsplice() so everyone is vulnerable.

One of the security issues existed for the entire lifetime of vmsplice(), so any kernel version from 2.6.17 onwards is vulnerable. This was fixed in 2.6.24.2, 2.6.23.16 and 2.6.22.18. It has been assigned the vulnerability identifier of CVE-2008-0600.

The other security issue first appeared in 2.6.23. It was fixed in 2.6.23.15 and 2.6.24.1. This vulnerability has been assigned CVE-2008-0009 and CVE-2008-0010.

gentoo-sources-2.6.23-r8 and gentoo-sources-2.6.24-r2 were added to the tree Monday and include fixes for both issues. Install the latest gentoo-sources as quickly as possible.

...
(more on gentoo.org)
Top
Kuja
n00b
n00b
Posts: 7
Joined: Mon Oct 02, 2006 11:15 pm

  • Quote

Post by Kuja » Wed Feb 13, 2008 9:44 pm

so hardened is affected too then?
or not?

edit: ignore that post, didn't saw that hardened was bumped on monday too, so it seems to be affected then :)
Top
hoffie
Retired Dev
Retired Dev
Posts: 24
Joined: Thu Nov 30, 2006 5:25 pm

  • Quote

Post by hoffie » Wed Feb 13, 2008 9:49 pm

Kuja wrote:so hardened is affected too then?
or not?
Hardened kernels are vulnerable as well, but depending on the configuration there is a chance that it is not exploitable.

See https://bugs.gentoo.org/show_bug.cgi?id=209460#c14, https://bugs.gentoo.org/show_bug.cgi?id=209460#c35 and https://bugs.gentoo.org/show_bug.cgi?id=207393
Top
MrCanis
n00b
n00b
User avatar
Posts: 61
Joined: Sun Dec 02, 2007 8:47 pm

Re: [NEWS] Kernel security exploits: Upgrade ASAP

  • Quote

Post by MrCanis » Wed Feb 13, 2008 9:51 pm

dberkholz wrote:This forums thread is for discussion of the www.gentoo.org posting, "Kernel security exploits: Upgrade ASAP." Post your comments and suggestions here.
Two major security flaws in the Linux kernel were reported last weekend. Both flaws have the same impact (root access for local users) and both exist within the vmsplice() system call, which was added to the kernel in 2.6.17. There is no configuration option to exclude vmsplice() so everyone is vulnerable.

One of the security issues existed for the entire lifetime of vmsplice(), so any kernel version from 2.6.17 onwards is vulnerable. This was fixed in 2.6.24.2, 2.6.23.16 and 2.6.22.18. It has been assigned the vulnerability identifier of CVE-2008-0600.

The other security issue first appeared in 2.6.23. It was fixed in 2.6.23.15 and 2.6.24.1. This vulnerability has been assigned CVE-2008-0009 and CVE-2008-0010.

gentoo-sources-2.6.23-r8 and gentoo-sources-2.6.24-r2 were added to the tree Monday and include fixes for both issues. Install the latest gentoo-sources as quickly as possible.

...
(more on gentoo.org)
Hello,
gentoo-sources-2.6.24-r2 are masked:

Code: Select all

emerge -av '>=gentoo-sources-2.6.24-r2'

These are the packages that would be merged, in order:

Calculating dependencies |
!!! All ebuilds that could satisfy ">=gentoo-sources-2.6.24-r2" have been masked.
!!! One of the following masked packages is required to complete your request:
- sys-kernel/gentoo-sources-2.6.24-r2 (masked by: ~x86 keyword)

For more information, see MASKED PACKAGES section in the emerge man page or 
refer to the Gentoo Handbook.
Is that version stable and someone has forgotten to unmask that package? Or is a mistake in the announcement (on www.gentoo.org).

Thanks in advance.

PS: I know how to unmask packages, but I don't want emerge a unstable kernel. :roll:
The 666 is behind the detail. ;)
Top
hoffie
Retired Dev
Retired Dev
Posts: 24
Joined: Thu Nov 30, 2006 5:25 pm

Re: [NEWS] Kernel security exploits: Upgrade ASAP

  • Quote

Post by hoffie » Wed Feb 13, 2008 10:09 pm

MrCanis wrote: Is that version stable and someone has forgotten to unmask that package? Or is a mistake in the announcement (on www.gentoo.org).
The announcement was inaccurate and has been updated by dberkholz by now. So, =gentoo-sources-2.6.23-r8 is the way to go on a stable system.
Top
MrCanis
n00b
n00b
User avatar
Posts: 61
Joined: Sun Dec 02, 2007 8:47 pm

Re: [NEWS] Kernel security exploits: Upgrade ASAP

  • Quote

Post by MrCanis » Wed Feb 13, 2008 10:47 pm

hoffie wrote:
MrCanis wrote: Is that version stable and someone has forgotten to unmask that package? Or is a mistake in the announcement (on www.gentoo.org).
The announcement was inaccurate and has been updated by dberkholz by now. So, =gentoo-sources-2.6.23-r8 is the way to go on a stable system.
Hello,
thanks for your quick response.

I use =gentoo-sources-2.6.23-r8, therefore I'm on the right site. :D
The 666 is behind the detail. ;)
Top
GenKreton
l33t
l33t
User avatar
Posts: 828
Joined: Sat Sep 20, 2003 2:06 am
Location: Cambridge, MA

  • Quote

Post by GenKreton » Thu Feb 14, 2008 12:27 am

this is a local exploit only, correct?
Top
tokj
n00b
n00b
User avatar
Posts: 15
Joined: Thu May 17, 2007 9:12 pm
Location: Delocalized

  • Quote

Post by tokj » Thu Feb 14, 2008 1:04 am

GenKreton wrote:this is a local exploit only, correct?
Yes, correct.
I think therefore I am. I think...
Top
dberkholz
Retired Dev
Retired Dev
User avatar
Posts: 1008
Joined: Tue Mar 18, 2003 6:51 am
Location: Minneapolis, MN, USA
Contact:
Contact dberkholz
Website

  • Quote

Post by dberkholz » Thu Feb 14, 2008 1:39 am

tokj wrote:
GenKreton wrote:this is a local exploit only, correct?
Yes, correct.
Yes, but be careful. Someone could exploit a vulnerability in a service that gets them local user-only privileges, and combine that with this in a two-step remote root. It's happened to us before.
Top
sgao
Tux's lil' helper
Tux's lil' helper
Posts: 149
Joined: Sat Apr 22, 2006 7:26 am

  • Quote

Post by sgao » Thu Feb 14, 2008 4:38 am

What about xen-sources-2.6.20-r6 and xen-sources-2.6.18-r8? Is there any need to patch xen-sources kernels?

Simon
Top
MannyNix
n00b
n00b
User avatar
Posts: 24
Joined: Sun Jan 13, 2008 7:57 am

  • Quote

Post by MannyNix » Thu Feb 14, 2008 6:25 am

Thanks, good job!
http://www.gentoo.org/proj/en/council/coc.xml
Top
SDenis
n00b
n00b
Posts: 2
Joined: Thu Feb 14, 2008 7:39 am

  • Quote

Post by SDenis » Thu Feb 14, 2008 7:43 am

Code: Select all

Linux localhost 2.6.20-xen-r6
~ $ ./a.out
-----------------------------------
 Linux vmsplice Local Root Exploit
 By qaaz
-----------------------------------
[+] mmap: 0x0 .. 0x1000
[+] page: 0x0
[+] page: 0x20
[+] mmap: 0x4000 .. 0x5000
[+] page: 0x4000
[+] page: 0x4020
[+] mmap: 0x1000 .. 0x2000
[+] page: 0x1000
[+] mmap: 0xb7d95000 .. 0xb7dc7000
Segmentation fault
One question - why another Ubuntu, Debian, SuSe just patch kernel, but Gentoo-users need recomlile\reinstall sources?
Gentoo отличная система.
Top
mark_alec
Bodhisattva
Bodhisattva
User avatar
Posts: 6066
Joined: Sat Sep 11, 2004 6:40 am
Location: Melbourne, Australia
Contact:
Contact mark_alec
Website

  • Quote

Post by mark_alec » Thu Feb 14, 2008 8:07 am

SDenis wrote:One question - why another Ubuntu, Debian, SuSe just patch kernel, but Gentoo-users need recomlile\reinstall sources?
Because those distributions provide an already compiled kernel.
www.gentoo.org.au || #gentoo-au
Top
steveL
Watchman
Watchman
Posts: 5153
Joined: Wed Sep 13, 2006 1:18 pm
Location: The Peanut Gallery

  • Quote

Post by steveL » Thu Feb 14, 2008 10:53 am

See [topic=659999]this thread[/topic] for more info.
Top
kostja
Apprentice
Apprentice
User avatar
Posts: 261
Joined: Tue May 25, 2004 3:01 pm
Location: D, 69239 Neckarsteinach
Contact:
Contact kostja
Website

  • Quote

Post by kostja » Thu Feb 14, 2008 11:16 am

Hello!

Anybody knows, which tuxonice sources are allready patched?

Konstantin
Registered Linux User #356484
Top
ma-ne
n00b
n00b
Posts: 1
Joined: Mon Nov 13, 2006 6:38 pm
Location: France - Lyon

  • Quote

Post by ma-ne » Thu Feb 14, 2008 11:52 am

sgao wrote:What about xen-sources-2.6.20-r6 and xen-sources-2.6.18-r8? Is there any need to patch xen-sources kernels?

Simon
Hello,

+1
Logic would say yes : 2.6.17 onwards is vulnerable
But am I right ?
ma-ne
Top
d2_racing
Bodhisattva
Bodhisattva
User avatar
Posts: 13047
Joined: Mon Apr 25, 2005 2:25 pm
Location: Ste-Foy,Canada
Contact:
Contact d2_racing
Website

  • Quote

Post by d2_racing » Thu Feb 14, 2008 12:33 pm

ma-ne wrote:Hello,
+1
Logic would say yes : 2.6.17 onwards is vulnerable
But am I right ?
ma-ne
Yes, the vmsplice is there since kernel 2.6.17.
Top
kojiro
Apprentice
Apprentice
User avatar
Posts: 245
Joined: Thu Nov 20, 2003 4:30 pm
Location: Rochester
Contact:
Contact kojiro
Website

Kernel upgrade guide link

  • Quote

Post by kojiro » Thu Feb 14, 2008 4:03 pm

OK, so anyone with half a brain knows that to get a new kernel you have to not only emerge it, but also compile it, install it, and reboot to it (or kexec).

Still, the implication of the news item:
On stable systems, do this
# emerge =gentoo-sources-2.6.23-r8

If you use ~arch keywords instead, do this
# emerge =gentoo-sources-2.6.24-r2
is that emerge =gentoo-sources-VERSION is all you have to do.

Can I talk someone into adding a link to http://gentoo.org/doc/en/kernel-upgrade.xml to the news item?
>>> Also, customizing emacs can be an exercise in black magic.
>> It's not black magic, it's Lisp.
>There is a difference? :P
Yes, black magic doesn't use parentheses.
--Linux Users' Group of Rochester mailing list
Top
`VL
n00b
n00b
User avatar
Posts: 71
Joined: Fri Apr 30, 2004 6:06 pm
Location: Russia

  • Quote

Post by `VL » Thu Feb 14, 2008 4:22 pm

Gentoo isn't releasing GLSAs for kernels because of the huge amount of work to track them for all 18 of our available kernel sources and versions within each of those.
Are you serious??! Shocked to know this. Too much work?! All other software is OK, and kernel is not?
Maybe just declare on of kernels 'official' and provide GLSAs for it? I think latest avaliable gentoo-sources/genkernel are candidates.
Life is too short to be taken seriously.
Top
doppelgaenger
n00b
n00b
Posts: 1
Joined: Thu Feb 14, 2008 4:29 pm

  • Quote

Post by doppelgaenger » Thu Feb 14, 2008 4:34 pm

I am running:

uname -a
Linux zoom 2.6.23-hardened-r4 on i686 and the local exploit works:

$ ./a.out
-----------------------------------
Linux vmsplice Local Root Exploit
By qaaz
-----------------------------------
[+] addr: 0xc041b17e
[+] root
gentoo ~ # whoami
root

When can we expect the hardened kernel update ?
Top
kallamej
Administrator
Administrator
User avatar
Posts: 4993
Joined: Fri Jun 27, 2003 10:05 am
Location: Gothenburg, Sweden

  • Quote

Post by kallamej » Thu Feb 14, 2008 6:31 pm

doppelgaenger wrote:I am running:

uname -a
Linux zoom 2.6.23-hardened-r4 on i686 and the local exploit works:

$ ./a.out
-----------------------------------
Linux vmsplice Local Root Exploit
By qaaz
-----------------------------------
[+] addr: 0xc041b17e
[+] root
gentoo ~ # whoami
root

When can we expect the hardened kernel update ?
It's fixed in the latest testing version (-r7).
Please read our FAQ Forum, it answers many of your questions.
irc: #gentoo-forums on irc.libera.chat
Top
tanderson
Retired Dev
Retired Dev
User avatar
Posts: 193
Joined: Wed Apr 11, 2007 12:14 pm

Re: Kernel upgrade guide link

  • Quote

Post by tanderson » Thu Feb 14, 2008 7:38 pm

kojiro wrote:OK, so anyone with half a brain knows that to get a new kernel you have to not only emerge it, but also compile it, install it, and reboot to it (or kexec).

Still, the implication of the news item:
On stable systems, do this
# emerge =gentoo-sources-2.6.23-r8

If you use ~arch keywords instead, do this
# emerge =gentoo-sources-2.6.24-r2
is that emerge =gentoo-sources-VERSION is all you have to do.

Can I talk someone into adding a link to http://gentoo.org/doc/en/kernel-upgrade.xml to the news item?
I've heard about kexec before but never really understood it. Is it possible to upgrade your kernel without rebooting(as in unmounting and shutting down)?
No Man is Just a Number!

--The Prisoner
Top
dberkholz
Retired Dev
Retired Dev
User avatar
Posts: 1008
Joined: Tue Mar 18, 2003 6:51 am
Location: Minneapolis, MN, USA
Contact:
Contact dberkholz
Website

  • Quote

Post by dberkholz » Thu Feb 14, 2008 7:40 pm

`VL wrote:
Gentoo isn't releasing GLSAs for kernels because of the huge amount of work to track them for all 18 of our available kernel sources and versions within each of those.
Are you serious??! Shocked to know this. Too much work?! All other software is OK, and kernel is not?
Maybe just declare on of kernels 'official' and provide GLSAs for it? I think latest avaliable gentoo-sources/genkernel are candidates.
What I've been told is that kernel developers do a spectacularly poor job of actually indicating which commits fix a given vulnerability, so it's a lot of work to find the patch. Every one also requires a minimum of 18 kernels to get stabilized by every architecture, some of which are poorly maintained and hard to get the maintainer to patch. The time that takes means by whenever we would actually be ready to release a GLSA, the next complete kernel version's probably already out.
Top
Voltago
Advocate
Advocate
User avatar
Posts: 2593
Joined: Tue Sep 02, 2003 1:54 pm
Location: userland

Re: Kernel upgrade guide link

  • Quote

Post by Voltago » Thu Feb 14, 2008 7:43 pm

gentoofan23 wrote:I've heard about kexec before but never really understood it. Is it possible to upgrade your kernel without rebooting(as in unmounting and shutting down)?
Since linuxbios does that in a way, I guess the answer is yes. But if you loose all system state information in the process (I think you do) and have to go through the init process again, it's not much different from rebooting.
Top
tabanus
l33t
l33t
User avatar
Posts: 638
Joined: Fri Jun 11, 2004 4:07 pm
Location: UK

  • Quote

Post by tabanus » Thu Feb 14, 2008 10:10 pm

dberkholz wrote:What I've been told is that kernel developers do a spectacularly poor job of actually indicating which commits fix a given vulnerability, so it's a lot of work to find the patch. Every one also requires a minimum of 18 kernels to get stabilized by every architecture, some of which are poorly maintained and hard to get the maintainer to patch. The time that takes means by whenever we would actually be ready to release a GLSA, the next complete kernel version's probably already out.
I asked almost 18 months ago for a better way of informing us about kernel security updates. I read about this story on the register earlier today, and am glad to see this thread here. It doesn't reflect well on the Gentoo community (or Linux as a whole) that this isn't easier to keep track of.
Things you might say if you never took Physics: "I'm overweight even though I don't overeat." - Neil deGrasse Tyson
Top
Post Reply
  • Print view

45 posts
  • 1
  • 2
  • Next

Return to “Gentoo Chat”

Jump to
  • Assistance
  • ↳   News & Announcements
  • ↳   Frequently Asked Questions
  • ↳   Installing Gentoo
  • ↳   Multimedia
  • ↳   Desktop Environments
  • ↳   Networking & Security
  • ↳   Kernel & Hardware
  • ↳   Portage & Programming
  • ↳   Gamers & Players
  • ↳   Other Things Gentoo
  • ↳   Unsupported Software
  • Discussion & Documentation
  • ↳   Documentation, Tips & Tricks
  • ↳   Gentoo Chat
  • ↳   Gentoo Forums Feedback
  • ↳   Duplicate Threads
  • International Gentoo Users
  • ↳   中文 (Chinese)
  • ↳   Dutch
  • ↳   Finnish
  • ↳   French
  • ↳   Deutsches Forum (German)
  • ↳   Diskussionsforum
  • ↳   Deutsche Dokumentation
  • ↳   Greek
  • ↳   Forum italiano (Italian)
  • ↳   Forum di discussione italiano
  • ↳   Risorse italiane (documentazione e tools)
  • ↳   Polskie forum (Polish)
  • ↳   Instalacja i sprzęt
  • ↳   Polish OTW
  • ↳   Portuguese
  • ↳   Documentação, Ferramentas e Dicas
  • ↳   Russian
  • ↳   Scandinavian
  • ↳   Spanish
  • ↳   Other Languages
  • Architectures & Platforms
  • ↳   Gentoo on ARM
  • ↳   Gentoo on PPC
  • ↳   Gentoo on Sparc
  • ↳   Gentoo on Alternative Architectures
  • ↳   Gentoo on AMD64
  • ↳   Gentoo for Mac OS X (Portage for Mac OS X)
  • Board index
  • All times are UTC
  • Delete cookies

© 2001–2026 Gentoo Foundation, Inc.

Powered by phpBB® Forum Software © phpBB Limited

Privacy Policy