Hole in the Linux kernel allows root access

Discussion in 'all things UNIX' started by ronjor, Nov 4, 2009.

Thread Status:
Not open for further replies.
  1. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    64,316
    Location:
    Texas
    The H Security
     
  2. Sputnik

    Sputnik Registered Member

    Joined:
    Feb 24, 2005
    Posts:
    1,198
    Location:
    Москва
    Please notice that this inflicts 'local root access' and not 'remote root access'.
     
  3. lodore

    lodore Registered Member

    Joined:
    Jun 22, 2006
    Posts:
    9,038
    its not really a big issue then.
    even thou users will excute practically anything.
     
  4. chronomatic

    chronomatic Registered Member

    Joined:
    Apr 9, 2009
    Posts:
    1,343
    Even though the kernel patch itself hasn't been released to a stable kernel yet, there is a work around that almost every distro has been using for a while now. If you are on Ubuntu and are not running Wine, you are safe.

    To check if you are indeed safe, run the following command from the terminal:
    Code:
    cat /proc/sys/vm/mmap_min_addr
    If it returns NULL (or 0) then you are affected. If it returns a non-zero number you are not affected. Ubuntu Karmic by default returns 65535. However, as I said, if you have Wine installed it will set it back to 0.

    I am really wondering why this is even news at all since this exploit is over a month old.
     
  5. chrisretusn

    chrisretusn Registered Member

    Joined:
    Jun 16, 2004
    Posts:
    1,358
    Location:
    Philippines
    Whether or not you are safe is distribution dependent. On my systems mmap_min_addr is > 0. I also have wine installed on one of them and it runs just fine.
     
Loading...
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.