Welcome, Guest. Please login or register.
Did you miss your activation email?

Author Topic:  Security Alert: possible privilege escalation in Linux < 3.14.4  (Read 3052 times)

Offline musca

  • User
  • Posts: 725
  • sid, fly high!
Hello dear siductians!

There is a CVE for recent linux kernel: a race condition leads to DoS or privilege escalation.
If you want to take action please do a dist-upgrade or install linux-image-3.14-3.towo.2-siduction-[amd64|686|686-pae] and its headers.
You need to reboot into the new kernel.

Thanks towo` for quickly uploading a patched kernel. Well done!

greetings
musca

[Edit]
not affected kernel versions: 
3.14-3.towo.2
3.14-4
3.15.rc5
« Last Edit: 2014/05/14, 12:32:37 by musca »
„Es irrt der Mensch, solang er strebt.“  (Goethe, Faust)

Offline bluelupo

  • User
  • Posts: 2.068
    • BluelupoMe
Re: Security Alert: possible privilege escalation in Linux
« Reply #1 on: 2014/05/12, 17:49:56 »
@towo: Really very quick to respond to the error in the kernel. Good work!

Offline terroreek

  • User
  • Posts: 202
Re: Security Alert: possible privilege escalation in Linux
« Reply #2 on: 2014/05/12, 18:06:53 »
Thank you Towo.

Offline ayla

  • User
  • Posts: 1.744
Re: Security Alert: possible privilege escalation in Linux
« Reply #3 on: 2014/05/12, 18:56:06 »
fix not available on the uni-stuttgart mirror at the moment, who want's to upgrade immediatly should use berlin.

Offline melmarker

  • User
  • Posts: 2.799
    • g-com.eu
Re: Security Alert: possible privilege escalation in Linux
« Reply #4 on: 2014/05/12, 19:46:19 »
habe ich den bug richtig verstanden? Diese lokale Sache? Ist Update-Panik da nich ein wenig fehl am Platz und eventuell übertrieben?

Please, don't panic.
Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety. (Benjamin Franklin, November 11, 1755)
Never attribute to malice that which can be adequately explained by stupidity. (Hanlons razor)

Offline michaa7

  • User
  • Posts: 2.298
Re: Security Alert: possible privilege escalation in Linux
« Reply #5 on: 2014/05/12, 20:04:06 »
Thanks towo, good work.

But melma(r)ker is right, don't panic, it's only localy triggerable, dude ;-)

But it seems, it is triggarabble if someone gets remote access as user (via a buggy webserver or the like. See here (german only, sorry): Kernels since 2.36.1-rc3 are affected!

Still, pached kernel very much appreciated!

(And if you don't find the kernel, it's 686, not i386 at the end of the name)

« Last Edit: 2014/05/12, 20:18:06 by michaa7 »
Ok, you can't code, but you still might be able to write a bug report for Debian's sake

Offline musca

  • User
  • Posts: 725
  • sid, fly high!
Re: Security Alert: possible privilege escalation in Linux
« Reply #6 on: 2014/05/13, 12:35:25 »
Hello,

Only few attacks do knock out the security by simple "remote code execution with root rights" in one step. Many attacks include a two step approach:  First take control of users code execution, then gain root privilege.

Now imagine how hackers will prepare such attacks: They silently are developing their methods to activate their own code and then they are waiting for the opportunity to become root. Not patching a known privilege escalation bug makes it easier for them to attack their target systems.

I think the alert shows our responsiveness and as a result there is no panic.
Doing a dist-upgrade or installing a kernel is just standard procedure.
@michaa7, thanks for the hint, i'll update the name.

greetings
musca
„Es irrt der Mensch, solang er strebt.“  (Goethe, Faust)

Offline musca

  • User
  • Posts: 725
  • sid, fly high!
Re: Security Alert: possible privilege escalation in Linux
« Reply #7 on: 2014/05/13, 16:58:30 »
Hello,

i was courious about the sample exploitcode and tried it.
I created a snapshot of my virtualmachine, so i can easily delete the compromized state afterwards.

In the first attempt the virtual machine has frozen, but in the second attempt:
Code: [Select]
user@sidubox:~/cve$ gcc cve-2014-0196-md.c -lutil -lpthread
user@sidubox:~/cve$ ./a.out
[+] Resolving symbols
[+] Resolved commit_creds: 0xffffffff8105e5bb
[+] Resolved prepare_kernel_cred: 0xffffffff8105e8af
[+] Doing once-off allocations
[+] Attempting to overflow into a tty_struct....
[+] Got it :)
root@sidubox:~/cve# whoami
root
root@sidubox:~/cve# id
uid=0(root) gid=0(root) Gruppen=0(root)
root@sidubox:~/cve# uname -a
Linux sidubox 3.14-3.towo-siduction-amd64 #1 SMP PREEMPT Tue May 6 20:46:12 UTC 2014 x86_64 GNU/Linux
root@sidubox:~/cve#
It took quite some some seconds of time.

Now reverting to the clean snapshot.
greetings
musca
„Es irrt der Mensch, solang er strebt.“  (Goethe, Faust)