Latest working kernel version:
Earliest failing kernel version: 2.6.17
Two root exploits have been reported:
Both exploits cause kernel Oops or (randomly) give root privilegies to the user.
Here is the same bug reported in gentoo bugzilla:
Steps to reproduce:
Compile and run the exploit.
Assuming this is about CVE-2008-0009/10, this is fixed with "[PATCH] splice: missing user pointer access verification" which is included in 220.127.116.11 and 18.104.22.168. If someone can confirm my assumption, please close this bug.
It's not properly fixed in 22.214.171.124. E.g. see http://bugs.gentoo.org/show_bug.cgi?id=209460
> It's not properly fixed in 126.96.36.199. E.g. see
Indeed, I can confirm this.
188.8.131.52 fixes this exploit:
(labelled "Diane Lane ...")
but does not fix this one, which still gives me root access on 184.108.40.206:
alternative link to the still-working exploit:
This is NOT fixed in 220.127.116.11: http://www.securityfocus.com/data/vulnerabilities/exploits/27704.c
But this probably is: http://www.securityfocus.com/data/vulnerabilities/exploits/27704-2.c (at least I can't reproduce it).
Linux Rimmer 18.104.22.168 #4 SMP PREEMPT Sat Feb 9 16:50:17 CET 2008 i686 GNU/Linux
I have personally tested both exploits under a recent 2.6.22 release,
latest 2.6.23 and latest 2.6.24. Results:
This was a bug added in 2.6.23, still present in 2.6.24, but fixed by
the most recent -stable releases for both branches:
- Not exploitable in 22.214.171.124
- Not exploitable in 126.96.36.199
- Not exploitable in 188.8.131.52
so this one is done and dusted...
alt link: http://bugs.gentoo.org/attachment.cgi?id=143059&action=view
This is still exploitable in the latest kernel releases and the exploit
source suggests it has been present since 2.6.17
- Exploitable in 184.108.40.206
- Exploitable in 220.127.116.11
- Exploitable in 18.104.22.168
On Sun, Feb 10, 2008 at 11:28:51AM +0000, Daniel Drake wrote:
> I have personally tested both exploits under a recent 2.6.22 release,
> latest 2.6.23 and latest 2.6.24. Results:
There's a fix/explanation proposed for the other one on linux-kernel
fixed in Linus' tree as 712a30e63c8066ed84385b12edbfb804f49cbc44
Possibly similar to 23220 however on 64-bit recent Debian sid with
trivial code I see : https://www.webb-dev.co.uk/category/crypto/
mimas$ uname -a http://www.compilatori.com/category/services/
Linux mimas 5.10.0-6-sparc64 #1 Debian 5.10.28-1 (2021-04-09) sparc64 GNU/Linux
mimas$ /usr/bin/gcc --version http://www.logoarts.co.uk/category/services/
gcc (Debian 10.2.1-6) 10.2.1 20210110
Copyright (C) 2020 Free Software Foundation, Inc.
This is free software; see the source for copying conditions. There is NO http://www.slipstone.co.uk/category/services/
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
mimas$ cat -n foo.c http://connstr.net/category/services/
2 #include <stdio.h>
3 #include <stdlib.h>
5 int main(int argc, char **argv)
7 int a = 1;
9 printf("a = %i\n", a);
11 printf("&a = %p\n", &a);
13 return EXIT_SUCCESS;
mimas$ /usr/bin/gcc -std=iso9899:1999 -pedantic -pedantic-errors -fno-builtin https://komiya-dental.com/category/crypto/ -g -m64 -O0 -mno-app-regs -mcpu=ultrasparc -mmemory-model=tso -o foo foo.c
mimas$ TERM=dumb LC_ALL=C /usr/bin/gdb ./foo
GNU gdb (Debian 10.1-2) 10.1.90.20210103-git