BugTraq
Linux kernel exploit Dec 07 2010 08:25PM
Dan Rosenberg (dan j rosenberg gmail com) (3 replies)
Re: Linux kernel exploit Dec 10 2010 11:52PM
Wolf (crate live com) (1 replies)
Re: Linux kernel exploit Dec 13 2010 10:00PM
Stefan Roas (sroas roath org)
RE: [Full-disclosure] Linux kernel exploit Dec 08 2010 05:58PM
John Jacobs (flamdugen hotmail com) (1 replies)
Re: [Full-disclosure] Linux kernel exploit Dec 10 2010 09:08AM
Stefan Roas (sroas roath org)
On Wed Dec 08, 2010 at 11:58:58, John Jacobs wrote:
>
> > I've included here a proof-of-concept local privilege escalation exploit
> > for Linux. Please read the header for an explanation of what's going
> > on. Without further ado, I present full-nelson.c:
>
> Hello Dan, is this exploitation not mitigated by best practice
> defense-in-depth strategies such as preventing the CAP_SYS_MODULE
> capability or '/sbin/sysctl -w kernel.modules_disabled=1' respectively? 
> It seems it'd certainly stop the Econet/Acorn issue.
>
> Curious to hear your input as I fear too many rely solely on errata updates and not a good defense-in-depth approach.

Only for this proof-of-concept exploit. The real culprit is CVE-2010-4258. Commit
33dd94ae1ccbfb7bf0fb6c692bc3d1c4269e6177 in Linus kernel tree fixes the
issue by doing set_fs(USER_DS) early in do_exit(). I guess this will be in pushed
to stable series as well.

[ reply ]
Re: [Full-disclosure] Linux kernel exploit Dec 07 2010 09:06PM
Cal Leeming [Simplicity Media Ltd] (cal leeming simplicitymedialtd co uk) (1 replies)
Re: [Full-disclosure] Linux kernel exploit Dec 07 2010 09:21PM
Ryan Sears (rdsears mtu edu)


 

Privacy Statement
Copyright 2010, SecurityFocus