Page 1 of 1

[SECURITY] [DSA-403-1] userland can access Linux kernel memo

PostPosted: Mon Dec 01, 2003 9:22 pm
by keimel
Hi folks. Pardon the new post by the completely new user :)

Am wondering if this issue is invalidated in GRSec or not. Given the extra randomness of memory allocation within the GRSec kernel (when turned on) I wonder if someone could still exploit the kernel in the manner suggested. I'll include some of hte important bits of the email I received from security announce here:

Recently multiple servers of the Debian project were compromised using a
Debian developers account and an unknown root exploit. Forensics
revealed a burneye encrypted exploit. Robert van der Meulen managed to
decrypt the binary which revealed a kernel exploit. Study of the exploit
by the RedHat and SuSE kernel and security teams quickly revealed that
the exploit used an integer overflow in the brk system call. Using
this bug it is possible for a userland program to trick the kernel into
giving access to the full kernel address space. This problem was found
in September by Andrew Morton, but unfortunately that was too late for
the 2.4.22 kernel release.


Once the webpage is updated, I imagine the notice will be at http://www.de.debian.org/security/2003/dsa-403 .

Pardon my lack of knowledge of the kernel memory mapping and how it relates to this exploit, but was hoping that if I ask here, someone might have a decent explanation of whether we're vulnerable.

Personally, I'm patched with grsecurity-1.9.4-2.4.18.patch.gz

Re: [SECURITY] [DSA-403-1] userland can access Linux kernel

PostPosted: Tue Dec 02, 2003 6:42 am
by PaX Team
keimel wrote:Am wondering if this issue is invalidated in GRSec or not.
the short and bad news is that you are most likely not protected, this bug seems to give complete access to kernel memory and can therefore circumvent any kernel based mechanism. apply the fix or upgrade to 2.4.23 if you haven't done so yet.