Hole in the Linux kernel allows root access

Discussion in 'all things UNIX' started by ronjor, Nov 4, 2009.

Thread Status:
Not open for further replies.
  1. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    57,755
    Location:
    Texas
    The H Security
     
  2. Sputnik

    Sputnik Registered Member

    Joined:
    Feb 24, 2005
    Posts:
    1,198
    Location:
    Москва
    Please notice that this inflicts 'local root access' and not 'remote root access'.
     
  3. lodore

    lodore Registered Member

    Joined:
    Jun 22, 2006
    Posts:
    9,006
    its not really a big issue then.
    even thou users will excute practically anything.
     
  4. chronomatic

    chronomatic Registered Member

    Joined:
    Apr 9, 2009
    Posts:
    1,343
    Even though the kernel patch itself hasn't been released to a stable kernel yet, there is a work around that almost every distro has been using for a while now. If you are on Ubuntu and are not running Wine, you are safe.

    To check if you are indeed safe, run the following command from the terminal:
    Code:
    cat /proc/sys/vm/mmap_min_addr
    If it returns NULL (or 0) then you are affected. If it returns a non-zero number you are not affected. Ubuntu Karmic by default returns 65535. However, as I said, if you have Wine installed it will set it back to 0.

    I am really wondering why this is even news at all since this exploit is over a month old.
     
  5. chrisretusn

    chrisretusn Registered Member

    Joined:
    Jun 16, 2004
    Posts:
    1,322
    Location:
    Philippines
    Whether or not you are safe is distribution dependent. On my systems mmap_min_addr is > 0. I also have wine installed on one of them and it runs just fine.
     
Loading...
Thread Status:
Not open for further replies.