LWN: Comments on "Local root vulnerability in the kernel" https://lwn.net/Articles/550678/ This is a special feed containing comments posted to the individual LWN article titled "Local root vulnerability in the kernel". en-us Sat, 06 Sep 2025 03:03:11 +0000 Sat, 06 Sep 2025 03:03:11 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net Local root vulnerability in the kernel https://lwn.net/Articles/551417/ https://lwn.net/Articles/551417/ nix <div class="FormattedComment"> Yeah, I was firing at the wrong thing. Misread, drag and ewan and you are right.<br> <p> One problem with the rather nice LWN Recent Comments thing is a lack of context, and it sometimes leaves you astray :)<br> <p> </div> Wed, 22 May 2013 16:45:33 +0000 Local root vulnerability in the kernel https://lwn.net/Articles/551302/ https://lwn.net/Articles/551302/ spender <div class="FormattedComment"> You guys are talking past each other.<br> <p> I mentioned (as an example) user namespaces as something new in the kernel that introduced significant vulnerability not present in earlier kernels.<br> <p> Drag then commented about the vulnerability that the article is about (the perf events vuln) being as significant as an ext4 data corruption bug.<br> <p> You then mentioned about how you wouldn't be hit by this vulnerability without extensive changes to your system. I believe you were referring to user namespaces here, but drag was referring to perf events. CONFIG_PERF_EVENT is forced on (why?) for anyone using X86.<br> <p> Ewan then followed up saying basically what I just said in the above paragraph, referring to the exploit released that was mentioned in this article, but without explicitly mentioning perf events you still understood him to be talking about user namespaces.<br> <p> All sorted now! :)<br> <p> -Brad<br> </div> Tue, 21 May 2013 20:32:44 +0000 Local root vulnerability in the kernel https://lwn.net/Articles/551260/ https://lwn.net/Articles/551260/ nix <div class="FormattedComment"> RHEL6 has user namespaces turned on?! That's... riskier than I would have expected from RH. I boggle.<br> <p> </div> Tue, 21 May 2013 14:33:04 +0000 Local root vulnerability in the kernel https://lwn.net/Articles/551241/ https://lwn.net/Articles/551241/ vonbrand <p>Kernel programmers haven't got the time, nor the training, to try and classify each patch (ranging from wording in a comment, code reorganization for clarity, up to new subsystems) into your four buckets (there are in fact hundreds of other buckets to consider).</p> Tue, 21 May 2013 01:54:52 +0000 Local root vulnerability in the kernel https://lwn.net/Articles/551004/ https://lwn.net/Articles/551004/ robert_s <div class="FormattedComment"> Ah, thanks, misunderstood.<br> </div> Fri, 17 May 2013 08:52:11 +0000 Local root vulnerability in the kernel https://lwn.net/Articles/550990/ https://lwn.net/Articles/550990/ deater <div class="FormattedComment"> <font class="QuotedText">&gt; if you want to switch perf off don't load the module or drop </font><br> <font class="QuotedText">&gt; it from your .config,</font><br> <p> perf can't be compiled as a module, and as far as I know it can't be turned off on x86 since about 2.6.37 or so. I'll be glad to be proven wrong on that count though.<br> <p> It's true any user/kernel interface leads to issues like this, but it doesn't help that perf has such a complex interface (check out the manpage for it sometime). We might have been better off if a simpler perf counter interface (like perfctr or perfmon2) that was closer to a thin layer abstracting the MSRs had been merged instead.<br> </div> Fri, 17 May 2013 02:57:30 +0000 Local root vulnerability in the kernel https://lwn.net/Articles/550967/ https://lwn.net/Articles/550967/ geofft <div class="FormattedComment"> He's speaking as an application developer, where the application he happens to develop is qemu. The claim is that other applications should do the same sandboxing to themselves as qemu does to itself -- there's no suggestion that apps should be run _inside_ qemu.<br> </div> Thu, 16 May 2013 22:18:02 +0000 Local root vulnerability in the kernel https://lwn.net/Articles/550942/ https://lwn.net/Articles/550942/ robert_s <div class="FormattedComment"> Um, are you suggesting here that the use of QEMU over just plain application-in-a-sandbox gives you any added security?<br> </div> Thu, 16 May 2013 16:31:49 +0000 Local root vulnerability in the kernel https://lwn.net/Articles/550940/ https://lwn.net/Articles/550940/ dowdle <div class="FormattedComment"> Red Hat has released an updated kernel.<br> </div> Thu, 16 May 2013 16:27:47 +0000 Local root vulnerability in the kernel https://lwn.net/Articles/550886/ https://lwn.net/Articles/550886/ charlieb <div class="FormattedComment"> Posting misinformation yet again?<br> </div> Thu, 16 May 2013 13:39:38 +0000 Local root vulnerability in the kernel https://lwn.net/Articles/550813/ https://lwn.net/Articles/550813/ aliguori <div class="FormattedComment"> It's really quite simple. The kernel/userspace boundary is huge with more stuff going in all of the time.<br> <p> Applications that are high risk need to proactively isolate themselves and reduce that boundary.<br> <p> Let's not kid ourselves here. If you have local user privileges and can run arbitrary code, SELinux or not, I'm quite confident there are more 0days out there that you could use to elevate to root.<br> <p> "unprivileged" users don't exist anymore.<br> </div> Thu, 16 May 2013 00:46:46 +0000 More information https://lwn.net/Articles/550806/ https://lwn.net/Articles/550806/ spender <div class="FormattedComment"> Or as done in PaX's KERNEXEC since 2003. Who knew that my presentation on "Linux Security in 10 years" (<a href="http://grsecurity.net/spender_summit.pdf">http://grsecurity.net/spender_summit.pdf</a>) would mention changes that took exactly 10 years? ;)<br> <p> -Brad<br> </div> Wed, 15 May 2013 23:46:04 +0000 Local root vulnerability in the kernel https://lwn.net/Articles/550800/ https://lwn.net/Articles/550800/ ewan <div class="FormattedComment"> "neither is going to happen unless you make some unusual changes to your system"<br> <p> Er - what? This exploit works on RHEL 6 in its default configuration. It's not exactly the far reaches of exotica.<br> </div> Wed, 15 May 2013 23:22:08 +0000 More information https://lwn.net/Articles/550798/ https://lwn.net/Articles/550798/ cesarb <div class="FormattedComment"> From that analysis:<br> <p> <font class="QuotedText">&gt; The interrupt descriptor table was chosen because it is very easy to get it's address even on hardened builds -- using sidt instruction.</font><br> <p> That reminded me of the following commit, which was merged for 3.10:<br> <p> <a href="https://git.kernel.org/linus/4eefbe792baedb474e256d35370849992fcf1c79">https://git.kernel.org/linus/4eefbe792baedb474e256d353708...</a><br> <p> <font class="QuotedText">&gt; Make a copy of the IDT (as seen via the "sidt" instruction) read-only. This primarily removes the IDT from being a target for arbitrary memory write attacks, and has the added benefit of also not leaking the kernel base offset, if it has been relocated.</font><br> </div> Wed, 15 May 2013 23:14:44 +0000 Local root vulnerability in the kernel https://lwn.net/Articles/550785/ https://lwn.net/Articles/550785/ spender <div class="FormattedComment"> Please stop repeating this misinformation. It does not prevent exploitation. sd's public exploit needs only a single character modification (discussed in my post) to "bypass" this "fix".<br> <p> -Brad<br> </div> Wed, 15 May 2013 21:40:27 +0000 Local root vulnerability in the kernel https://lwn.net/Articles/550784/ https://lwn.net/Articles/550784/ bojan <div class="FormattedComment"> <font class="QuotedText">&gt; GregKH and others handle it by saying "you really should be updating, because we don't know beforehand which of these bugfixes will have an exploit developed".</font><br> <p> But that is exactly opposite of what is so often being requested. If developers don't know, that's fine.<br> <p> The issue is that the problems that are _known_ to have security impact are not reported as such.<br> </div> Wed, 15 May 2013 21:33:39 +0000 Local root vulnerability in the kernel https://lwn.net/Articles/550782/ https://lwn.net/Articles/550782/ landley <div class="FormattedComment"> By the way, "sandboxing" won't help a kernel that's running in ring 0 from something that lets you write to arbitrary memory; if you want to switch perf off don't load the module or drop it from your .config, a distro flinging everything at the wall and then adding _more infrastructure to switch it off again seems kinda silly. (Neither will selinux's whack-a-mole rules: if it's unknown, by definition you haven't got a rule for it yet.)<br> <p> As the old saying goes, you either make the system simple enough there are obviously no vulnerabilities, or you make it complicated enough there are no obvious vulnerabilities.<br> <p> (Of course "unknown" is relative. I'm curious about <a rel="nofollow" href="http://www.exploit-db.com/exploits/25444/">http://www.exploit-db.com/exploits/25444/</a> having "2010" in the copyright-like notice up top. I know the israeli secret service and russian kleptocracy and such have way better fuzzers than open source has bothered with until recently, the main protection for Ubuntu systems is we're less than 1% of the installed base so nobody _cares_. I'd worry more about android phones getting morris-wormed with something like this...)<br> </div> Wed, 15 May 2013 21:14:28 +0000 Local root vulnerability in the kernel https://lwn.net/Articles/550781/ https://lwn.net/Articles/550781/ landley <div class="FormattedComment"> echo 2 &gt; /proc/sys/kernel/perf_event_paranoid<br> <p> </div> Wed, 15 May 2013 21:05:10 +0000 Local root vulnerability in the kernel https://lwn.net/Articles/550779/ https://lwn.net/Articles/550779/ drag <div class="FormattedComment"> It's not all that honest all the time. Certainly that can be part of it, but it's Linux kernel policy to not bring attention to bugs like this. <br> <p> This has been brought up many times before on lwn.net. <br> <p> There are a lot of people working with a lot of companies that market their products as being rather secure. They often see a distinct advantage to not admitting to problems because that makes their products look better when people compare vulnerability lists on places like Secunia. <br> <p> <p> </div> Wed, 15 May 2013 21:03:08 +0000 Local root vulnerability in the kernel https://lwn.net/Articles/550775/ https://lwn.net/Articles/550775/ nix <div class="FormattedComment"> Quite. I'd say this security bug was about as serious as the obscure ext4 bug that ate my filesystem: both have serious consequences, but neither is going to happen unless you make some unusual changes to your system: in my case, mounting with certain mount options and then rebooting in the middle of a umount; in this case, turning on a config option which pretty much screams SECURITY PROBLEMS HERE, and which can't be turned on in conjunction with a lot of other commonly-used options which are probably already on. I know I wasn't faced with the *option* to turn on userspace namespaces until 3.9: many people, e.g. those using XFS, probably still can't see it. In both cases the fault was really one of documentation: the ext4 mount option didn't say it was experimental and dangerous, so tweakers-for-tweaking's-sake like me might well turn it on without realizing the danger; this option, too, was missing that disclaimer in the Kconfig help text.<br> <p> </div> Wed, 15 May 2013 20:55:43 +0000 Local root vulnerability in the kernel https://lwn.net/Articles/550769/ https://lwn.net/Articles/550769/ drag <div class="FormattedComment"> It seems that time has proven current policies as incorrect.<br> <p> Sure, all security bugs can be security bugs, but once they are known to be security issues then that is a issue. <br> <p> It should be treated with the same level of importance as, say, a bug in Ext4 that corrupts your file system. Nobody would suggest that should be downplayed and hidden like security bugs are in the Linux kernel.<br> </div> Wed, 15 May 2013 20:46:42 +0000 Local root vulnerability in the kernel https://lwn.net/Articles/550771/ https://lwn.net/Articles/550771/ landley <div class="FormattedComment"> You could also try echo 2 &gt; /proc/sys/kernel/perf_event_paranoid<br> </div> Wed, 15 May 2013 20:46:22 +0000 Local root vulnerability in the kernel https://lwn.net/Articles/550765/ https://lwn.net/Articles/550765/ fandingo <div class="FormattedComment"> Not on the latest release. However, you should be using a kernel that is actively maintained, and you should be using the current version of that maintained series. <br> <p> Kernel series being maintained (and hosted on kernel.org) are<br> <p> mainline: 3.10-rc1 2013-05-12<br> stable: 3.9.2 2013-05-11<br> stable: 3.8.13 [EOL] 2013-05-11<br> stable: 3.7.10 [EOL] 2013-02-27<br> longterm: 3.4.45 2013-05-11<br> longterm: 3.2.45 2013-05-13<br> longterm: 3.0.78 2013-05-11<br> longterm: 2.6.34.14 2013-01-16<br> longterm: 2.6.32.60 2012-10-07<br> linux-next: next-20130515 2013-05-15<br> <p> </div> Wed, 15 May 2013 20:23:44 +0000 More information https://lwn.net/Articles/550760/ https://lwn.net/Articles/550760/ nix <div class="FormattedComment"> A damn good explanation, too.<br> </div> Wed, 15 May 2013 19:29:42 +0000 Local root vulnerability in the kernel https://lwn.net/Articles/550757/ https://lwn.net/Articles/550757/ nix <div class="FormattedComment"> You're right in some areas, but here... I'm not sure user namespaces are a good example. If they're configured out there is no security risk, virtually no distro turned them on because many filesystems don't support them yet, they default to off because they're known to be not fully baked yet, and anyone who looks at something tricky and invasive like user namespaces and *doesn't* think 'hey, there are going to be multiple vulnerabilities, or at least horrible bugs, reported here while the design kinks are worked out' hasn't been using software very long.<br> <p> </div> Wed, 15 May 2013 19:26:32 +0000 Local root vulnerability in the kernel https://lwn.net/Articles/550743/ https://lwn.net/Articles/550743/ aliguori <div class="FormattedComment"> The one thing that does stop this vulnerability is seccomp() mode 2.<br> <p> We have seccomp() support in QEMU and we do not have this system call in our whitelist. If an attacker was able to break into QEMU, sandboxing would stop the attempted privilege escalation.<br> <p> It's a good example of why more applications should use sandboxing if they are likely attack targets.<br> </div> Wed, 15 May 2013 18:42:37 +0000 More information https://lwn.net/Articles/550734/ https://lwn.net/Articles/550734/ fuhchee <div class="FormattedComment"> See also <a href="https://bugzilla.redhat.com/show_bug.cgi?id=962792#c16">https://bugzilla.redhat.com/show_bug.cgi?id=962792#c16</a> for Petr Matousek's analysis.<br> </div> Wed, 15 May 2013 17:37:05 +0000 More information https://lwn.net/Articles/550733/ https://lwn.net/Articles/550733/ corbet For the curious, Brad posted <a rel="nofollow" href="http://www.reddit.com/r/netsec/comments/1eb9iw/sdfucksheeporgs_semtexc_local_linux_root_exploit/c9ykrck">a detailed explanation</a> of how the exploit works over on Reddit. Wed, 15 May 2013 17:35:28 +0000 Local root vulnerability in the kernel https://lwn.net/Articles/550727/ https://lwn.net/Articles/550727/ faramir <div class="FormattedComment"> <font class="QuotedText">&gt;to a large degree, just about any kind of kernel bug is a security issue; to a large extent that's just the nature/role of the kernel.</font><br> <p> I would mostly agree with this statement as well, but I would point out that one can subdivide "security issue" into different categories. Here are some possible categories:<br> <p> 1. Denial of service<br> 2. Leaking of privileged information<br> 3. Modification of privileged information<br> 4. Privilege escalation<br> 5. Loss of user data<br> <p> I would aggregate 2, 3, and 4 into a single bucket because historically they have frequently been found to be equivalent. It seems to me that this was a #3 bug and (again given historical trends) should have been treated as if it was a #4 bug. It clearly wasn't.<br> <p> Perhaps if kernel programmers attempted to classify bugs using something like the above categories and then treated ones that fell into the more sensitive buckets as if they were security problems, this kind of thing could be prevented. Under the current system, we seem to be assuming that all kernel programmers are also security experts and can accurately assess the security implications of all of their code/bug fixes. This seems a little too much to ask even of them.<br> <p> <p> </div> Wed, 15 May 2013 17:20:40 +0000 Local root vulnerability in the kernel https://lwn.net/Articles/550731/ https://lwn.net/Articles/550731/ bluss <div class="FormattedComment"> It suggests we need a deeper approach to security, to combat this on multiple levels. The newest kernels have some holes and the older kernels have others.<br> </div> Wed, 15 May 2013 17:12:50 +0000 Local root vulnerability in the kernel https://lwn.net/Articles/550728/ https://lwn.net/Articles/550728/ spender <div class="FormattedComment"> I didn't respond to the first part of your post yet.<br> <p> You are correct that I don't agree with how the vulnerabilities are handled. However, you're incorrect that I agree with your first sentence. I feel that it's a form of a logical fallacy employed to excuse the handling of vulnerabilities.<br> <p> -Brad<br> </div> Wed, 15 May 2013 17:07:37 +0000 Local root vulnerability in the kernel https://lwn.net/Articles/550722/ https://lwn.net/Articles/550722/ spender <div class="FormattedComment"> Conversely, it demonstrates the danger of running newer kernels. The vuln was not present in older kernels, as newer kernels bring with them not only silent vuln fixes but also new, poorly-tested vulnerable code to exploit. (user namespaces anyone?)<br> <p> Let's meet in the middle and say it demonstrates the danger of running Linux kernels ;)<br> <p> -Brad<br> <p> <p> </div> Wed, 15 May 2013 16:50:22 +0000 Local root vulnerability in the kernel https://lwn.net/Articles/550723/ https://lwn.net/Articles/550723/ Trou.fr <div class="FormattedComment"> So basically you would like to see every one running the latest kernel from kernel.org ?<br> </div> Wed, 15 May 2013 16:43:14 +0000 Local root vulnerability in the kernel https://lwn.net/Articles/550713/ https://lwn.net/Articles/550713/ arjan <div class="FormattedComment"> to a large degree, just about any kind of kernel bug is a security issue; to a large extent that's just the nature/role of the kernel.<br> <p> I know Spender does not really agree with how the kernel team handles these, but even Spender will likely agree with my first sentence.<br> <p> GregKH and others handle it by saying "you really should be updating, because we don't know beforehand which of these bugfixes will have an exploit developed". They do not say "the planet is on fire" kind of thing. But the final thing is the same, you SHOULD update.<br> <p> BTW, this also shows the danger of running older kernels, even if someone is backporting things for you; this bugfix might not have been picked up for backporting because there was no CVE for it.... this one got found and CVE'd so it'll be backported. But there are likely dozens similar changes with similar exposure for which no public exploit exists *yet*.<br> <p> <p> </div> Wed, 15 May 2013 16:31:01 +0000 Local root vulnerability in the kernel https://lwn.net/Articles/550690/ https://lwn.net/Articles/550690/ fuhchee <div class="FormattedComment"> "It wasn't seen as a security bug"<br> <p> There may be an element of wilful ignorance here. <a href="https://patchwork.kernel.org/patch/2441281/">https://patchwork.kernel.org/patch/2441281/</a> clearly said "passed by user-space ... out-of-bounds access".<br> </div> Wed, 15 May 2013 15:14:31 +0000 stap band-aid for kernel CVE-2013-2094 https://lwn.net/Articles/550688/ https://lwn.net/Articles/550688/ mjw <div class="FormattedComment"> There is a quick and dirty systemtap guru mode band-aid script at <a href="https://bugzilla.redhat.com/show_bug.cgi?id=962792#c13">https://bugzilla.redhat.com/show_bug.cgi?id=962792#c13</a> if you must really run an vulnerable kernel and cannot quickly upgrade.<br> </div> Wed, 15 May 2013 15:08:24 +0000 Local root vulnerability in the kernel https://lwn.net/Articles/550683/ https://lwn.net/Articles/550683/ spender <div class="FormattedComment"> Something important missing from this summary is that while the exploit was posted yesterday, it was authored in 2010. The author of the exploit (and many previous exploits) discloses private exploits once he spots them being killed upstream: <a href="http://article.gmane.org/gmane.comp.security.oss.general/10189">http://article.gmane.org/gmane.comp.security.oss.general/...</a><br> <p> SELinux won't help, perf_event_paranoid=2 won't help -- for a right-thinking person, this could be seen as motivation for a change of course out of the ashes of such a dramatic failure. Unfortunately, I think Michael Gilbert is right on the money about what will really result from all this: <a href="http://seclists.org/oss-sec/2013/q2/329">http://seclists.org/oss-sec/2013/q2/329</a>. Vulnerability patched, problem solved; rinse and repeat.<br> <p> If your only source of protection against exploitation of the vulnerability is waiting on your distro to provide an updated kernel package, then it's already too late.<br> <p> I posted more specific notes on exploitation here:<br> <a href="http://www.reddit.com/r/netsec/comments/1eb9iw/sdfucksheeporgs_semtexc_local_linux_root_exploit/c9ykrck">http://www.reddit.com/r/netsec/comments/1eb9iw/sdfuckshee...</a><br> <p> -Brad<br> </div> Wed, 15 May 2013 15:07:25 +0000 Local root vulnerability in the kernel https://lwn.net/Articles/550687/ https://lwn.net/Articles/550687/ dowdle <div class="FormattedComment"> Just wanted to mention that OpenVZ released an updated kernel fixing this yesterday. For anyone using OpenVZ, here's the info:<br> <p> <a href="http://wiki.openvz.org/Download/kernel/rhel6/042stab076.8">http://wiki.openvz.org/Download/kernel/rhel6/042stab076.8</a><br> </div> Wed, 15 May 2013 15:05:58 +0000