Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
Linux Kernel NULL Pointer Vulnerability (securityfocus.com)
30 points by ErrantX on Aug 14, 2009 | hide | past | favorite | 15 comments


patch is here: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6...

This has been giving us headaches from clients all day so I figured it made sense to post it (as no one else appears to have done so) - seeing as it affects pretty much everything since the 2.4 kernel.

Might be a good moment to update those kernels people :)

(elreg blurb: http://www.theregister.co.uk/2009/08/14/critical_linux_bug/)


These are really beautiful exploits. Other people have written them up better than I can, so I won't bother, but it's worth tracking down the writeups; you'll be a slightly smarter person after reading them, and they'll make you smile.



This was a more useful article than the actual post


agreed, thanks kirubakaran!

It has a really simple but effective explanation of the NULL dereferencing problem.


That is an excellent explanation of a truly surprising vulnerability, but I'm pretty sure that was a different local-root Linux kernel null-pointer bug, one discovered a month earlier.


Someone once wrote art is "that which makes us better". I think that applies here. :)


Isn't this like the last bug? Limited to being an exploit on systems where the default security policy is (was) to allow writable mappings at page zero? If so, shouldn't the SELinux treatment for those be effective here too?


It looks like "the SELinux treatment for those" is to disable SELinux?


Note that this is a local exploit, not a remote exploit. I guess that means panic but not too much.

Nice ad for trustix!


Sigh, again? I don't follow vulnerabilities that well but isn't this the third NULL pointer vulnerability this year?

I run a Debian server but strangely there are no kernel updates.


Haha and I was thinking the other day reading ms tech bulletins that MS always has such a long list of affected software!. Look at this: 473 different versions


The length of the list is a function of two variables, the first the length the bug has been in production, the second the number of versions you have released in to the wild.

What you're seeing here is a fairly rare occurrence in the linux world, a bug that has been in the code for a long long time. Frequent releases are pretty common in open source projects.


It seems this vulnerability exists to accommodate WINE.





Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: