Bug In Most Linuxes Can Give Untrusted Users Root

Ben Scott dragonhawk at gmail.com
Wed Nov 4 20:34:06 EST 2009


  I'm way too tired right now to read through the whole morass, but
some people on /. are saying that this issue only occurs when (1) you
allow the untrusted user to run a setuid-root executable and (2) that
executable allows arbitrary user-supplied modules to be loaded.  If
that's accurate, then my though is, "Well, duh!".

  Either way, the issue reportedly depends on being able to mmap a
page to virtual address zero, and you can tell the kernel not to
permit such a low mmap address.

liberty$ cat /proc/sys/vm/mmap_min_addr
65536

  liberty is running CentOS 5.whatever-is-current, and I never did
anything to set that.

-- Ben


More information about the gnhlug-discuss mailing list