fixed in v2.6.31.1
fixed in v2.6.31.1
Posted Sep 24, 2009 17:54 UTC (Thu) by mingo (guest, #31122)In reply to: Kernel release status by spender
Parent article: Kernel release status
FYI, v2.6.31.1 (released today) has this bug fixed, and upstream -git had this bug fixed a couple of days ago via:
b3e62e3: perf_counter: Fix buffer overflow in perf_copy_attr()
Also, v2.6.31 with SELinux (NULL pointer mitigation) should not be exploitable. (the local user DoS is still there though, so an upgrade is recommended even if you are using SELinux)
Thanks,
Ingo
Posted Sep 24, 2009 19:36 UTC (Thu)
by spender (guest, #23067)
[Link] (3 responses)
It is absolutely exploitable without requiring a NULL mapping. I've proven it with work, not words. Where's your proof?
-Brad
Posted Sep 24, 2009 19:37 UTC (Thu)
by spender (guest, #23067)
[Link] (2 responses)
Posted Sep 25, 2009 9:04 UTC (Fri)
by mingo (guest, #31122)
[Link] (1 responses)
Btw., that you felt the need to name the exploit after me i found particularly telling (and somewhat amusing): it shows a basic lack of Git knowledge. 'git annotate kernel/perf_counter.c' is not hard to use at all, it shows who wrote what part of the kernel.
FYI, i did not write the code which had the bug and which we fixed, and based on which upstream fix you then distributed a working exploit for. (I reviewed and signed off on it, and i missed the bug, so no doubt i'm part of the chain of review responsibility - this example just further demonstrates exposes your irrational hatred.)
Posted Sep 27, 2009 10:00 UTC (Sun)
by nix (subscriber, #2304)
[Link]
Police officers are prone to the same failing: with shift work and long
Posted Sep 24, 2009 19:55 UTC (Thu)
by spender (guest, #23067)
[Link] (25 responses)
-Brad
Posted Sep 25, 2009 1:13 UTC (Fri)
by busterb (subscriber, #560)
[Link] (24 responses)
Posted Sep 25, 2009 5:26 UTC (Fri)
by Klavs (guest, #10563)
[Link] (4 responses)
Posted Sep 25, 2009 7:10 UTC (Fri)
by mingo (guest, #31122)
[Link] (3 responses)
Agreed, it's a good idea.
Note that the fix for this bug was queued up for 2.6.31.1 before the exploit was posted. (That doesn't of course in any way mitigate the fact that this was an exploitable bug.)
Mr. Spender took the commit log of the fix that others already debugged, created, tested and submitted, and made it easier for script kiddies to vandalize Linux systems by posting an exploit.
As i expressed it earlier, i wish Mr. Spender had more empathy with the project he is trying to contribute to and if he were more mature in not harming it at the same time. Posting an almost-exploit or just saying that it's exploitable is generally enough to get immediate attention - while also avoiding a lot of immediate harm.
Btw., that posting should be immediate and as public as possible, to notify all interested parties [which includes script kiddies and black hats as well] - no matter how embarrassing it might be to the developers and maintainers involved.
Mr. Spender's choice to maximally help script kiddies while trying to maximally harm the people who are actually work on making Linux better (short of him committing a potential felony by launching attacks himself or selling the exploit) certainly qualifies his character - but it's also useful even in this form, no doubt about that.
I'm sure that a parallel or complimentary security effort with real ongoing work injected would be helpful. The sanest approach would be to also notify the -stable maintainers IMHO - the -stable maintainers are very responsive in general.
Posted Sep 25, 2009 8:52 UTC (Fri)
by drag (guest, #31333)
[Link] (2 responses)
For every spender I expect there are a dozen people doing exactly that.
Personally I have to maintain a handful of different kernels for personal
Although it would be nice if Spender could direct his attention towards
Posted Sep 25, 2009 9:34 UTC (Fri)
by mingo (guest, #31122)
[Link] (1 responses)
Although it would be nice if Spender could direct his attention towards
finding exploits in rc kernels! :) Maybe one of the big commercial Linux
guys would hire him or some other group of people to concentrate entirely
on code quality in terms of security and figuring out more and more
automated checks and whatnot. Something can be done, I suppose.
Indeed, people who find and fix bugs in Linux, with a special attention on security issues, and who try to help people and who are able to work with people are a hot commodity and get picked up by Linux companies quickly.
(Because, not the least, the very same skills and talents can also be used to fix robustness and stability problems and to design better code.)
Alas, Spender is not such a person AFAICT - or if he is, he has not demonstrated such bug finding and communication skills yet. (in a way visible to me at least)
He has not tried to seriously work with the upstream kernel, and in the Git history of Linux, spanning 4 years and over 160,000 changes/fixes, there's not a single commit/fix authored by him. There's not a single commit log entry where he was mentioned as bug reporter or tester.
It really takes a concentrated effort to stay out of the contribution zone to that level, if one is interested in security bugs. (In contrast i found a handful of 'PaX Team' commits.)
Most of the exploits i've seen from him so far were based on other people's work and generally weren't genuine security bugs he himself found. Some of the exploits show creativity (but are not always credited to Mr. Spender himself so it's unclear whether he wrote them).
One has to question the judgement (and wisdom) of someone opting to help attackers with the most ruthless yet borderline legal means, just to raise 15 minutes of attention.
I personally think it's still useful as long as there's still a net benefit to Linux (which there is here) - and the resulting embarrassment to developers that keeps us all sharper is helpful too - but the process of elaborate and very public self-destruction is always sad to observe.
The thing is, finding genuine security bugs in Linux is hard and takes a lot of skill and a lot of talent. Kenrel people and Linux companies will quickly notice if you have that skill.
Posted Sep 25, 2009 15:03 UTC (Fri)
by spender (guest, #23067)
[Link]
Now, from there, having been so embarrassingly wrong, and not having had the common sense to review the links in my post to which you were replying, one would expect a "I was mistaken" response -- but not from you of course. In typical fashion, what we get instead is a series of ad-hominem attacks. Allow me to enumerate your charges:
You claim that I haven't found or fixed bugs in Linux.
So let's take these claims one by one.
You claimed that I harmed security by not immediately notifying everyone about the vulnerability. This is a curious claim, because it doesn't look good for you or for Linux kernel development in general. And in fact it negates one of your other claims (that observing an OOPs and submitting a report for a "kernel crash" and writing one line of code is more difficult than actually determining the vulnerability class and exploiting it.)
So here is my question to you. Is it the case that yourself, Paul Mackerras, Xiao Guangrong, Greg Kroah-Hartman, Peter Zijlstra, Eugene Teo and the other members of oss-security *ALL* can not plainly see that trivial, classic stack overflows, like the one signed-off on the fix for, are exploitable for arbitrary code execution? Did you all really believe that it was purely a "kernel crash" as noted in the commit message you all reviewed and signed off on?
If that is the case, I feel sorry for Linux kernel development. Perhaps your respective companies could pay to send you to an entry-level security crash course to learn what gets done with trivial stack overflows.
If that's not the case, and you were aware that the vulnerability was exploitable for arbitrary code execution, why is the onus on me to inform the stable maintainers or the world at large of the vulnerability? Isn't that your job in the commit messages that you write and review? Is it somehow my fault that people are being knowingly mislead (including the security teams of the various vendors, who republished the "kernel crash" claim and had the CVE marked as a denial of service issue)? Is it my fault that nobody in the Linux kernel development community seems to think twice about "buffer overflow" and "kernel crash" being in the same sentence in a commit message? We (in conjunction with the rest of the security industry -- Linus was awarded with a Pwnie this year for being voted the worst at handling security issues) have been arguing for a long time now for you guys to end your silly practice of obfuscation and lies.
Put plainly, you're arguing with the wrong person. We keep demonstrating the harm of these silly commit messages; you'd be better served by growing a spine and launching your complaints at the people who are actually responsible for this current situation. I'd be happily surprised to see that happen, but suspect that it won't.
You claim that I'm engaged in borderline-felonious activity. Do you make the same claims about any other security researcher that posts exploits? About all the people in the security industry writing modules for Metasploit?
Public exploits are very effective in making a point. Here's some of the lessons you should have learned from this (but apparently were asleep during class):
If it wasn't clear to people before, it should be plainly clear now what kind of security "guarantees" can be provided when a framework exists that rewrites the SELinux code to pretend that it's in enforcing mode or completely defeats IMA. Linux was benefiting in appearance only by not having something like this published -- since it's nothing any private exploit writer hadn't written themselves. Now that it is public, the correct response should be "what can we do about this problem?" Fixing bugs isn't the answer (you'll just add more in the next kernel), neither is attacking the person who demonstrated the techniques to you. Did you forget what caused mmap_min_addr to be added to the kernel in the first place?
You know very well that I've found and fixed bugs and vulnerabilities in Linux. Have you forgotten our private conversations about exec-shield vulnerabilities I reported to you that you fixed silently? I still have the emails, if necessary. What about the missing NULL pointer checks issue? The SELinux vulnerability? The exploitability of NULL pointer dereferences in general? How quickly we forget, and what an obvious example of why I would have no interest in cooperating with you in the future. As many can attest (yourself included), I contact them privately about vulnerabilities in their code. I'm not always given credit (like with the SELinux issue). Very few of the things I've reported privately that have been fixed in the kernel I have been given credit for, so it's no surprise that you didn't find anything in your (rather contrived) search (much like your benchmarks, I wager). Given that I don't believe I've ever sent a single message to LKML, I don't imagine I would be listed as the author of any commit. Being listed as a bug reporter is something at the discretion of the committer, so again, no surprise there.
Furthermore, had it occurred to you that I'm not interested in finding and fixing your bugs? For each one I fix, you'll add two more. Finding and patching bugs doesn't improve security. Just like userland security was a cesspool until PaX arrived on the scene (where any memory corruption bug could be exploited by someone who read some simple Phrack articles), kernel security is the same way without any defensive techniques. It's developing those techniques, as I have been doing, that I'm interested in -- preventing exploit vectors, stopping exploitation of entire bug classes, not in wasting time fixing your individual bugs so that you can add more next week. Oh and you guessed it, it's my dream in life to one day work for a Linux vendor. Writing up 30 advisories every month for all the packages that use webkit, I can see it now!
You claim that my exploits are plagiarized, due to the fact that I don't put my name on some of them. Had it occurred to you that maybe I don't care so much about putting my name in it if it's obvious I wrote it? You can follow my postings on twitter where I discuss additions to the framework I developed. If you have questions about the authenticity of the code, those questions should exist whether I put my name in it or not.
You claim that I'm choosing to help attackers just to gain some attention for myself. I don't think posting messages only to my twitter account that only a handful of people read is an attempt to get attention. As I mentioned earlier, if I were to do what you suggested and let the entire world know, you would accuse me of the same attention seeking, so it's impossible for any researcher to escape your misdirected criticism. I know that members of the security teams for several vendors, including that of your own company, follow my twitter and so are immediately notified. In fact, you can see several examples of it on oss-security where they link to me explicitly. The attention I want to bring is to the mislabeling of security vulnerabilities caused by the kernel developers' official policy of obfuscating commit messages. The lies contained in them propagate into the CVE, which then give everyone a false representation of their risk. And you are complicit in this behavior.
So in summary, Ingo, I have a bit of advice for you that will avoid such embarrassment in the future, and then you won't have to waste your time on misguided and misinformed ad-hominem attacks against one of the few people who are actually improving the security of Linux: if you're about to enter a discussion and speak authoritatively on a topic, do your research first. How can you really expect to be an expert on something you know nothing about? I don't come on LKML and engage in scheduler debates with you, acting as an expert on the subject who has done his research -- what is it about security that makes it OK for you to pose as an armchair expert about any arbitrary topic? Your time would be better spent learning instead of talking.
A simple "my mistake, I didn't do my research before opening my mouth" would have saved us both a lot of time. Pissing off me and the PaX team isn't exactly productive -- after all, where will your company get its new (effective) security features from?
-Brad
Posted Sep 25, 2009 6:43 UTC (Fri)
by PaXTeam (guest, #24616)
[Link] (18 responses)
it's not fun but it's what works for kernel developers. this is what Linus himself said in the past at least:
"I really _despise_ people who think security is an issue of hiding
The only thing that seems to work for security is public shaming.
And yeah, I get personally embarrassed by some of the things we've
> but wouldn't fixing problems be even more productive?
but we've always done that. what we find and fix ourselves is released in our patches (without the fanfare).
Posted Sep 25, 2009 8:45 UTC (Fri)
by hppnq (guest, #14462)
[Link] (17 responses)
You do not submit a patch for the Linux kernel. Instead, an exploit is released, with a lot of fanfare indeed. Selectively quoting Linus about the greatness of shame is not going to convince people that it is Linux security you are after. In fact, I am not even so convinced anymore that you are just plugging your own software at the expense of someone else's.
Posted Sep 25, 2009 12:17 UTC (Fri)
by spender (guest, #23067)
[Link] (7 responses)
-Brad
Posted Sep 25, 2009 18:09 UTC (Fri)
by dlang (guest, #313)
[Link] (6 responses)
also, it's very common for the -stable release to wait until after the initial merge window before releasing 2.6.x.1 the same developers who do the -stable work also work on the main kernel and that is a very busy two weeks.
Posted Sep 25, 2009 18:20 UTC (Fri)
by foom (subscriber, #14868)
[Link] (5 responses)
Apparently it takes the existence of a public exploit for a kernel bug's severity to be properly
Posted Sep 26, 2009 9:55 UTC (Sat)
by mingo (guest, #31122)
[Link] (4 responses)
It simply was not known as an exploitable bug. When we know something is exploitable a -stable kernel is released immediately, within hours.
(Let me know about a labeling method that actually works in practice - i'm not aware of any. Post facto labeling does not actually prevent bugs from getting mislabeled - it mostly only increases the security theatre - i.e. rewards the wrong kind of behaviour and the people who leech off of that.)
Also, note that if you had StackProtector enabled (CONFIG_CC_STACKPROTECTOR_ALL=y), the bug is not exploitable into a local root hole but gets caught and the break-in attempt gets exposed:
It's a good thing we revived this feature in recent kernels, it already caught real kernel bugs and also catches exploit attempts.
Posted Sep 26, 2009 12:47 UTC (Sat)
by spender (guest, #23067)
[Link] (1 responses)
Let the record show that the Linux kernel development community and oss-security can't spot the exploitability of a trivial stack overflow.
It would be funny if it weren't so pathetic.
-Brad
Posted Sep 26, 2009 13:16 UTC (Sat)
by mingo (guest, #31122)
[Link]
So I have the answer to my question above then: "Is it the case that yourself, Paul Mackerras, Xiao Guangrong, Greg Kroah-Hartman, Peter Zijlstra, Eugene Teo and the other members of oss-security *ALL* can not plainly see that trivial, classic stack overflows, like the one signed-off on the fix for, are exploitable for arbitrary code execution? Did you all really believe that it was purely a "kernel crash" as noted in the commit message you all reviewed and signed off on?"
Yes, it indeed happens.
I take responsibility for this having slipped through (i should have caught it), and let me defend those other hard working people, who take an active part in the upstream kernel development process. Yes, nobody is infallible, and no, i dont think your repeated attempts to ridicule them is fair or justified.
If you think you could do better then i'd invite you to take part in the process instead of taking pot shots at it externally. Otherwise you'll never know whether you could do better than those whom you attack so viciously.
The fundamental question there (if you care): are you able to participate in a constructive community? Judging by your messages your life seems to be defined by hatred.
Posted Sep 26, 2009 13:20 UTC (Sat)
by spender (guest, #23067)
[Link] (1 responses)
How quickly you forgot this:
and the fact that you actually committed his fix (and so were involved in the discussion above):
Did you have any proof for that one? That SSP stops exploitation of a vuln that doesn't even involve overwriting a return address?
-Brad
Posted Sep 26, 2009 13:45 UTC (Sat)
by mingo (guest, #31122)
[Link]
Did you have any proof for that one? That SSP stops exploitation of a vuln that doesn't even involve overwriting a return address?
Indeed, i was wrong about that in the changelog, mea culpa. StackProtector has its place, but it would not have stopped the vmsplice exploit.
Thanks,
Ingo
Posted Sep 25, 2009 19:25 UTC (Fri)
by PaXTeam (guest, #24616)
[Link] (8 responses)
wow, lots of accusations there. let's see.
first of all, i didn't release let alone write this exploit, spender did, so you'll have to take that up with him, not me.
second, since you're seemingly unfamiliar with the Linux kernel development process, let me explain the situation briefly. your first task is to read Documentation/SubmittingPatches which is a file in the kernel source tree. in there you will find something called the Developer's Certificate of Origin (in section 12 as of .31). careful reading will reveal the following bits:
| then you just add a line saying
notice that anonymous contributions are explicitly not allowed (those words were actually added because of a patch of mine a few years ago). so there is the answer to your accusation.
> Selectively quoting Linus about the greatness of shame is not going to convince people that it is Linux security you are after.
why was that selective again? but more to the point, it seemingly works and makes people take a second look and tell something closer to the truth in turn. that can only be good for security, or do you believe that covering up security bugs is better?
> In fact, I am not even so convinced anymore that you are just plugging your own software at the expense of someone else's.
did you even read what i responded to? it was a suggestion about releasing our own security fixes as an alternative to the so-called 'stable' series (apparently that implies neither timely nor honest). obviously when we've already done that work for many years now, i'll not withhold the fact. as for the expense part, it sounds like as if you didn't like the taste of your own medicine.
Posted Sep 26, 2009 10:45 UTC (Sat)
by mingo (guest, #31122)
[Link] (2 responses)
notice that anonymous contributions are explicitly not allowed (those words were actually added because of a patch of mine a few years ago). so there is the answer to your accusation.
I don't question your honesty, but FYI, your level of paranoia is reaching clinical levels.
If you don't trust others to know your real name, why do you expect millions of others to trust your anonymous word that the code you have contributed is indeed yours, with no legal strings attached? (such as an employer you work for currently and who thus does not know (and cannot know, due to the pseudonym) that you contribute in corporate time, etc.)
As far as it being added to the SOB requirements based on your case - that might simply be because in 99.99% of the cases people are actually proud of being mentioned in the Linux kernel source (it's even a good point for your career so generally considered stupid if you forfeit it), so this situation was simply not contemplated before?
Nevertheless i do always look at your fix patches and accept them (for subsystems i maintain) if they are good. I add my own signoff so i take responsibility for your patches, and credit you for the fix. I do think you are genuinely interested in (and worried about) Linux security, you are competent and capable, and I think you are doing good fixes.
As an example look at this upstream fix that you wrote:
So there's absolutely no impediment to you contributing fixes to the Linux kernel, if you chose to do so. All it takes is to find someone with a real name who trusts you enough to take fixes from you.
(bigger patches are still a problem of course.)
the so-called 'stable' series (apparently that implies neither timely nor honest).
Do you have proof of (or even an indication of) that -stable is dishonest? I don't have such an indication, and i take honesty and security seriously.
Have you considered alternative possibilities, such as honest mistakes or lack of information? Or the possibility of maintainers being genuinely worried about and interested in a far wider spectrum of system stability than the important but (technically) narrow sub-set of security related bugs?
Posted Sep 27, 2009 10:34 UTC (Sun)
by nix (subscriber, #2304)
[Link] (1 responses)
So we have PaXTeam on one side damning the stable team for not doing all
Posted Sep 27, 2009 10:35 UTC (Sun)
by nix (subscriber, #2304)
[Link]
Posted Sep 27, 2009 7:21 UTC (Sun)
by hppnq (guest, #14462)
[Link] (4 responses)
busterb suggested:
You could set up a git repository with the fixes you find from which the -stable maintainers could pull, instead of wasting your time and energy on arguing with people over things that have nothing to do with security.
As for real security: I ran the perf_counter exploit through Brad's framework on my pristine, default Ubuntu distribution and it fails right after it killed pulseaudio, so it was only a bit annoying.
Posted Sep 27, 2009 12:32 UTC (Sun)
by spender (guest, #23067)
[Link] (3 responses)
Run the wrong exploit, obviously get the wrong results ;)
-Brad
Posted Sep 27, 2009 14:06 UTC (Sun)
by hppnq (guest, #14462)
[Link] (2 responses)
That said, these bugs need to be fixed. But your sense of urgency and your tone are easily ignored -- sometimes much too easily -- and therefore, the question whether you plan to ever cooperate better with the kernel developers remains valid and to the point. If you would strip all communication of its unneeded emotion, and for instance, simply set up a repository that contains the fixes you find during your research, this could prove to be very fruitful to all parties.
Posted Sep 27, 2009 14:19 UTC (Sun)
by spender (guest, #23067)
[Link] (1 responses)
As for the repository:
our code has always been open for anyone to pull fixes from.
PS: what system doesn't handle untrusted user data?
-Brad
Posted Sep 27, 2009 20:32 UTC (Sun)
by hppnq (guest, #14462)
[Link]
You mean, in the case where users download 2.6.31 and blindly reuse a non-matching distribution-supplied config? That is not a safe practice. Otherwise, I have to assume that either the distribution or the user knows what is turned on, with what impact.
Incorporating fixes in your own patches is not the same as fixing bugs in the vanilla kernel. (The link doesn't work, so I am assuming it points to a full-blown grsecurity patch, which is not part of the vanilla kernel.) That said, you seem to write excellent code, and I wish more of your efforts would end up in the kernel in a way that satisfies you, the kernel developers, and Linux users alike. A git repository seems like a good idea. It's not so much the code contribution that's important (crucial fixes will always be picked up), but the cooperation it would help shape.
Well, in the office we of course work with data classifications (and there is no "completely trusted" one), but here I would say a home or test system that is not connected to a public network fits the bill. When referring to systems that do handle untrusted data, I was thinking of Internet facing systems that, for instance, allow FTP or shell access, and I couldn't think of a reason why an admin would turn on profiling on them, or why the admin would not have a security policy based on the assumption that these systems will be hacked to pieces sooner or later.
fixed in v2.6.31.1
fixed in v2.6.31.1
fixed in v2.6.31.1
fixed in v2.6.31.1
in any way: it's that Brad's perspective is necessarily skewed by the work
he does. He spends his whole time looking at the kernel in an adversarial
manner, hunting for faults and ripping them open: of course the parts of
the kernel which work well will fall beneath his notice, and kernel
developers will come to be seen as a contemptible and possibly malevolent
bunch of fault-introducers. I've seen exactly this symptom in some of the
best software testers I've worked with: they find problems really well but
very soon you wish you could hire someone just to sit between them and you
and be a verbal punchbag.
hours, after a while all they see of the non-police world is victims and
criminals, and the part they concentrate on is the criminals. Of course
they'll come to see everyone around them as a potential criminal.
fixed in v2.6.31.1
code did its pointer arithmetic correctly (which it
did not), the vulnerability would *still* be
exploitable without a NULL mapping.
fixed in v2.6.31.1
the problems you find? Sure, criticizing and naming exploits after people you'd like to publicly
shame is fun, but wouldn't fixing problems be even more productive? Just release 2.6.31.1.1 with all
the things you deem important fixed. Might even give you an interesting new perspective on
software development.
fixed in v2.6.31.1
fixed in v2.6.31.1
fixed in v2.6.31.1
> or selling the exploit)
Linux is big business now and big money is to be had by trolling the kernel
commit logs and looking for mislabeled vulnerabilities. I suppose that
there is enough money in it that a person could do pretty much nothing else
but follow along with kernel development and make a living that way.
and professional reasons. It would be nice if I could trust the commit
logs. :)
finding exploits in rc kernels! :) Maybe one of the big commercial Linux
guys would hire him or some other group of people to concentrate entirely
on code quality in terms of security and figuring out more and more
automated checks and whatnot. Something can be done, I suppose.
fixed in v2.6.31.1
fixed in v2.6.31.1
You claim that my work is plagiarized (funny concept coming from you -- exec-shield, CFS, perf counters, etc).
You claim that I'm choosing to help attackers to gain attention for myself.
You claim that I'm engaging in borderline-felonious activity.
You claim that I harmed security by not immediately issuing a release to full-disclosure/dailydave/LKML about the vulnerability.
1) An exploit not being made public isn't an excuse to pretend one doesn't exist
2) All of the exploits I've written have been developed and fully-weaponized in under an hour.
3) Given how quickly these can be developed, it's been made clear that the stable maintainers and Linux vendors are ill-equipped to respond quickly enough.
4) Don't rest on the laurels of your ineffective security measures.
5) Obfuscating commit messages doesn't stop someone who wants to write an exploit from figuring out what the issue is.
6) Even your most prized security features can be defeated.
fixed in v2.6.31.1
bugs. If they then try to make themselves look good ("no zero-day
exploit, we fixed it immediately"), they're worse than low.
had too, and some of that public shaming from the bug can well fall
on me. I've had cases where I've simply _forgotten_ about some bug
that was reported to me, or more commpnly [sic] just overlooked it.
Shame on me. That's ok."
fixed in v2.6.31.1
what we find and fix ourselves is released in our patches
fixed in v2.6.31.1
fixed in v2.6.31.1
fixed in v2.6.31.1
described as an arbitrary code execution exploit, instead of just a denial-of-service crash.
fixed in v2.6.31.1, also caught by StackProtector
[ 66.928106] Kernel panic - not syncing: stack-protector: Kernel stack is corrupted in: ffffffff810c49d2
[ 66.928109]
[ 66.939059] Pid: 2628, comm: exploit Not tainted 2.6.31 #17228
[ 66.944947] Call Trace:
[ 66.947423] [ffffffff81622ba6] panic+0x84/0x12f
[ 66.952238] [ffffffff810c49d2] ? sys_perf_counter_open+0x660/0x672
[ 66.958729] [ffffffff810500cd] __stack_chk_fail+0x27/0x57
[ 66.964419] [ffffffff810c49d2] sys_perf_counter_open+0x660/0x672
fixed in v2.6.31.1, also caught by StackProtector
fixed in v2.6.31.1, also caught by StackProtector
fixed in v2.6.31.1, also caught by StackProtector
http://www.pubbs.net/kernel/200904/62088/
"the vmsplice exploit would only have been caught by the -ALL variant."
http://copilotconsulting.com/mail-archives/linux-kernel.2...
http://copilotconsulting.com/mail-archives/linux-kernel.2...
fixed in v2.6.31.1, also caught by StackProtector
fixed in v2.6.31.1
|
| Signed-off-by: Random J Developer <random@developer.example.org>
|
| using your real name (sorry, no pseudonyms or anonymous contributions.)
fixed in v2.6.31.1
e003208: x86: fix stackprotector canary updates during context switches
fixed in v2.6.31.1
PaXspeak appears to mean 'does not research every single patch to
determine if it fixes an exploitable hole, then pause the release while a
CVE is assigned and rewrite the changelog to include the CVE number and
exploit'. If a single hole lacks a CVE we get flames on LWN (why pick on
LWN, which is just reporting them? Search me. Maybe he wants as many
people as possible to dislike him. LWN used to have a pleasant collegial
comment atmosphere before these PaXTeam and Brad Spengler came along. Now
it often feels like alt.flame: I certainly want a killfile again.)
*that* and Brad on the other damning them for not releasing quickly. You
can't win.
fixed in v2.6.31.1
despite getting 'thanks' and accusations of incompetence, lying, and
malice with virtually every release. I know I'd have given up long ago and
told these horrible people to do the releases themselves if they cared so
much about them. Greg is more mature than that thankfully. :)
fixed in v2.6.31.1
did you even read what i responded to? it was a suggestion about releasing our own security fixes as an alternative to the so-called 'stable' series
Brad, why don't you and PaXTeam just release an intermediate .x stable kernel patch series to fix
the problems you find?
fixed in v2.6.31.1
./run_nonnull_exploits.sh and chose "Ingo m0wnar"
I was just pulling your leg, my system -- pristine, default Ubuntu -- is not running 2.6.31 in the first place. ;-) You may think this is silly, but I think that this observation makes a lot of sense when it comes to "real" security. The first question, when doing a vulnerability assessment, is not "Is it remotely exploitable?", it is "Are we running that stuff?". So in this case, anyone who is running 2.6.31 with perf counters on a system that handles untrusted user data is likely to be vulnerable. Not too many people, I should think, fall in that category without knowing it.
fixed in v2.6.31.1
fixed in v2.6.31.1
http://grsecurity.net/test/grsecurity-2.1.14-2.6.31.1-200...
fixed in v2.6.31.1
As I mentioned elsewhere, anyone using a distro config will have perf counters automatically enabled without knowing it (since it gets turned on if PROFILING=y, which the vendors all enable).
our code has always been open for anyone to pull fixes from.
PS: what system doesn't handle untrusted user data?