Fwd: Linux Kernel Vulnerability

RICHARD BARTH w3hwn at comcast.net
Fri Oct 21 16:57:35 CDT 2016


According to one review I read, it was discovered some years ago and a fix prepared.

It was dropped, though, because the fix caused problems with one of the IBM machines

the software was commonly run on, and the bug wasn't considered to be a big one at 

the time.


Dick

> On October 21, 2016 at 5:46 PM Jason Wright <jason at thought.net> wrote:
> 
> 
>     A friend and I spent some time looking at a proof of concept exploit of this vulnerability this afternoon. Nasty... Essentially it provides a pivot from unprivileged user to root by allowing the corruption of a cached page that is supposed to be read only (copy on write). It's pretty clever and because it doesn't corrupt the file on disk, not easily traceable.
> 
>     --Jason Wright
> 
> 
>     On Oct 21, 2016 2:20 PM, "RICHARD BARTH" <w3hwn at comcast.net mailto:w3hwn at comcast.net > wrote:
> 
>         > > 
> > 
> >             > -------- Original Message ----------
>             From: US-CERT <US-CERT at ncas.us-cert.gov mailto:US-CERT at ncas.us-cert.gov >
>             To: w3hwn at arrl.net mailto:w3hwn at arrl.net
>             Date: October 21, 2016 at 2:20 PM
>             Subject: Linux Kernel Vulnerability
> 
> 
>             [U.S. Department of Homeland Security US-CERT]
> 
>             National Cyber Awareness System:
> 
>              
> 
>             Linux Kernel Vulnerability https://www.us-cert.gov/ncas/current-activity/2016/10/21/Linux-Kernel-Vulnerability
>             10/21/2016 12:50 PM EDT
> 
>             Original release date: October 21, 2016
> 
>             US-CERT is aware of a Linux kernel vulnerability known as Dirty COW (CVE-2016-5195). Exploitation of this vulnerability may allow an attacker to take control of an affected system.
> 
>             US-CERT recommends that users and administrators review the Red Hat CVE Database https://access.redhat.com/security/cve/cve-2016-5195 , the Canoical Ubuntu CVE Tracker http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html , and CERT Vulnerability Note VU#243144 https://www.kb.cert.org/vuls/id/243144 for additional details, and refer to their Linux or Unix-based OS vendors for appropriate patches.
> 
> 
>             ---------------------------------------------
> 
>             This product is provided subject to this Notification http://www.us-cert.gov/privacy/notification and this Privacy & Use http://www.us-cert.gov/privacy/ policy.
> 
> 
> 
>             ---------------------------------------------
>             A copy of this publication is available at www.us-cert.gov https://www.us-cert.gov . If you need help or have questions, please send an email to info at us-cert.gov mailto:info at us-cert.gov . Do not reply to this message since this email was sent from a notification-only address that is not monitored. To ensure you receive future US-CERT products, please add US-CERT at ncas.us-cert.gov mailto:US-CERT at ncas.us-cert.gov to your address book.
>             OTHER RESOURCES:
>             Contact Us http://www.us-cert.gov/contact-us/ | Security Publications http://www.us-cert.gov/security-publications | Alerts and Tips http://www.us-cert.gov/ncas | Related Resources http://www.us-cert.gov/related-resources
>             STAY CONNECTED:
>             [Sign up for email updates] http://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new
> 
>             SUBSCRIBER SERVICES:
>             Manage Preferences http://public.govdelivery.com/accounts/USDHSUSCERT/subscribers/new?preferences=true   |  Unsubscribe https://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/one_click_unsubscribe?verification=5.b03cc84c90ac58ffb6e970add416fb2d&destination=w3hwn%40arrl.net   |  Help https://subscriberhelp.govdelivery.com/
> 
> 
>             ---------------------------------------------
>             This email was sent to w3hwn at arrl.net mailto:w3hwn at arrl.net using GovDelivery, on behalf of: United States Computer Emergency Readiness Team (US-CERT) · 245 Murray Lane SW Bldg 410 · Washington, DC 20598 · (888) 282-0870 	[Powered by GovDelivery] http://www.govdelivery.com/portals/powered-by
> 
>         
_______________________________________________
Tacos mailing list
Tacos at amrad.org mailto:Tacos at amrad.org
https://lists.amrad.org/mailman/listinfo/tacos https://lists.amrad.org/mailman/listinfo/tacos


_______________________________________________
Tacos mailing list
Tacos at amrad.org
https://lists.amrad.org/mailman/listinfo/tacos

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.amrad.org/pipermail/tacos/attachments/20161021/470c819a/attachment-0001.html>


More information about the Tacos mailing list