Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Servers

    New Linux Security Hole Found

    By
    Steven J. Vaughan-Nichols
    -
    June 14, 2004
    Share
    Facebook
    Twitter
    Linkedin

      A Linux bug was recently uncovered by a young Norwegian programmer that, when exploited by a simple C program, could crash most Linux 2.4 or 2.6 distributions running on an x86 architecture.

      “Using this exploit to crash Linux systems requires the (ab)user to have shell access or other means of uploading and running the program—like cgi-bin and FTP access,” reports the discoverer, Øyvind Sæther.

      “The program works on any normal user account, and root access is not required,” Sæther reported. “This exploit has been reported used to take down several lame free-shell providers servers. [Running code you know will damage a system intentionally and hacking in general] is illegal in most parts of the world and strongly discouraged.”

      Along with the code needed to use the exploit, Sæther also posted several patches to 2.4 and 2.6 kernels that will keep the exploit from crashing systems.

      Several security problems have been uncovered in Linux over the past year. The most serious was uncovered in February by the Polish security nonprofit organization iSEC Security Research.

      The biggest of these security holes, called “Linux kernel do_mremap VMA limit local privilege escalation vulnerability” by iSEC, could have enabled a cracker to achieve full super-user and full administration privileges. In each case, fixes were quickly delivered by the Linux open-source community.

      This latest security hole, however, can be used to crash a system, but it doesnt give an attacker any other control of a Linux system.

      Technically, the problem exists because the Linux kernels signal handler isnt handling floating-point (FP) exceptions correctly. Linuxs creator, Linus Torvalds, said, “Theres a path into the kernel where if there is a pending FP error, the kernel will end up taking an FP exception, and it will continue to take the FP exception forever. Duh.”

      Torvalds already has the problem well in hand, he said. “I fixed it in my [source code] tree a few days ago, so its in the current snapshots, and if I wasnt in the middle of a move [to Portland, Ore.] Id have released a 2.6.7 already. As it is, Ill hopefully have it done by tomorrow [June 15].

      Eric Raymond, president of the Open Source Initiative, added, “It isnt a big deal. This one can be trivially fixed. This fixable kernel crasher doesnt cause any new problems.”

      Check out eWEEK.coms Linux & Open Source Center at http://linux.eweek.com for the latest open-source news, reviews and analysis.

      Be sure to add our eWEEK.com Linux news feed to your RSS newsreader or My Yahoo page

      Avatar
      Steven J. Vaughan-Nichols
      I'm editor-at-large for Ziff Davis Enterprise. That's a fancy title that means I write about whatever topic strikes my fancy or needs written about across the Ziff Davis Enterprise family of publications. You'll find most of my stories in Linux-Watch, DesktopLinux and eWEEK. Prior to becoming a technology journalist, I worked at NASA and the Department of Defense on numerous major technological projects.

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×