SCF Advanced Search


Members
Stats
  • Total Posts: 32494
  • Total Topics: 9867
  • Online Today: 1549
  • Online Ever: 51419
  • (01. January 2010., 10:27:49)











Author Topic: Linux administrators need to Patch a newly discovered bug in the kernel...  (Read 1715 times)

0 Members and 1 Guest are viewing this topic.

Samker

  • SCF Administrator
  • *****
  • Posts: 7444
  • KARMA: 312
  • Gender: Male
  • Whatever doesn't kill us makes us stronger.
    • SCforum.info - Samker's Computer Forum


Linux admins need to get busy patching, as a newly discovered bug has emerged in the kernel's tty handling – and it lets logged-in users crash the system, gain root privileges, or otherwise modify and access data they shouldn't.

This memory corruption flaw is certainly nothing like OpenSSL's remotely exploitable Heartbleed – CVE-2014-0196: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0196
But this local root hole is problematic where users are sharing the same Linux host in the cloud.

Here's how US-CERT described the issue: https://www.us-cert.gov/ncas/bulletins/SB14-132

“The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the 'LECHO & !OPOST' case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.”

A user only needs shell access to be in a position to exploit the programming blunder.

The bug was introduced in 2009 with version v2.6.31-rc3 of the kernel. Before that, as noted at this Novell SUSE security discussion, “pty [the pseudo-terminal – El Reg] was writing directly to a line discipline without using buffers”: https://bugzilla.novell.com/show_bug.cgi?id=875690

Ubuntu has been patched: http://www.ubuntu.com/usn/usn-2204-1/ , Red Hat is working on a fix for its Enterprise Linux 6 and Enterprise MRG 2 distos (RH Enterprise Linux 5 isn't affected): https://bugzilla.redhat.com/show_bug.cgi?id=1094232
OpenWall has also patched: http://www.openwall.com/lists/oss-security/2014/05/05/6 Debian's patches will arrive here: https://security-tracker.debian.org/tracker/CVE-2014-0196

There's an unreliable proof-of-concept here: http://bugfuzz.com/stuff/cve-2014-0196-md.c

(ElReg)

Samker's Computer Forum - SCforum.info

Sponsored Links:




devnullius

  • SCF VIP Member
  • *****
  • Posts: 3527
  • KARMA: 153
  • Gender: Female
    • SCForum.info
Most misleading picture EVER  :down:

Giving a nitwit Linux... It will cause problems and many many many "how do I..."-phone calls :(

Just saying ;p
More information about bitcoin, altcoin & crypto in general? GO TO  j.gs/7385484/btc

Cuisvis hominis est errare, nullius nisi insipientis in errore persevare... So why not get the real SCForum employees to help YOUR troubled computer!!! SCF Remote PC Assist http://goo.gl/n1ONa9

jheysen

  • SCF Global Moderator
  • *****
  • Posts: 858
  • KARMA: 110
  • Gender: Male
I didn't want to update the servers so soon :/

devnullius

  • SCF VIP Member
  • *****
  • Posts: 3527
  • KARMA: 153
  • Gender: Female
    • SCForum.info
I didn't want to update the servers so soon :/

Yeah... Kernel 0.1a works like a charm ;p

:>
More information about bitcoin, altcoin & crypto in general? GO TO  j.gs/7385484/btc

Cuisvis hominis est errare, nullius nisi insipientis in errore persevare... So why not get the real SCForum employees to help YOUR troubled computer!!! SCF Remote PC Assist http://goo.gl/n1ONa9

Samker

  • SCF Administrator
  • *****
  • Posts: 7444
  • KARMA: 312
  • Gender: Male
  • Whatever doesn't kill us makes us stronger.
    • SCforum.info - Samker's Computer Forum
Most misleading picture EVER  :down:

...

 :up:

...picture for cogitation...

 

With Quick-Reply you can write a post when viewing a topic without loading a new page. You can still use bulletin board code and smileys as you would in a normal post.

Name: Email:
Verification:
Type the letters shown in the picture
Listen to the letters / Request another image
Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.scforum.info:

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Terms of Use | Privacy Policy | Advertising