Responding to the kernel ELF vulnerability
This vulnerability affects kernels in the 2.2, 2.4 and 2.6
series. According to Starzetz report, the flaw is in the function
elf_core_dump(), in binfmt_elf.c.
This function does not correctly handle the argument area
of the ELF process, which could be abused to override the memory layout:
(1) initial ELF memory layout before starting to load program sections: ----------------EMPTY------------------[ ARGS stack region ] TASK_SIZE (2) possible memory layout after loading ELF sections: ---------[CODE][DATA]------------------[FAKE][stack region ] TASK_SIZEwhere FAKE is an ELF section mmaped into memory with PROT_NONE rights specified.
What seems odd is the amount of attention that the vulnerability is getting, or the lack thereof. While Colin Percival's report of a vulnerability in Hyper-Threading is getting attention, the ELF vulnerability has barely been a blip on the radar.
To date, only Trustix has issued an alert and fix for this issue. Red Hat has just issued a kernel update, but the ELF vulnerability is not mentioned in the release announcement. We've checked the lists for Ubuntu, Debian, Mandriva, Slackware, Fedora, Fedora Legacy, Yellow Dog -- none of these distributions have issued a update yet for what appears to be a fairly serious local exploit. As of this writing, nearly a week has passed since Starzetz made the discovery public.
At the same time, most of those vendors have released new versions of Squid to deal with a vulnerability that would allow malicious users to spoof DNS lookups. The Squid vulnerability was announced the same day as the ELF loader vulnerability.
It does seem that a patch, at least for the 2.6 series, is
available. Given the potential severity of the vulnerability, we're
curious to see how long it will be before updates are made available from
the major distributions. With Linux under close scrutiny for security
vulnerabilities and vendor response times, one hopes that it will be soon.
| Index entries for this article | |
|---|---|
| GuestArticles | Brockmeier, Joe |
