* Kernel NULL pointer vulnerability: AX.25 module
@ 2009-08-14 17:59 Curt, WE7U
2009-08-26 17:16 ` Ralf Baechle DL5RB
0 siblings, 1 reply; 2+ messages in thread
From: Curt, WE7U @ 2009-08-14 17:59 UTC (permalink / raw)
To: linux-hams
FYI: My CentOS 5.x systems appear to be ok. CentOS 4.x systems are
supposed to be vulnerable. My OpenSuSE 11.x systems appear to be
vulnerable but I'm only running AX.25 on one machine and only
occasionally. Note that there's a type in the net-pf-24 line below
also. Read the LWM link or Google for additional info. --we7u
---------- Forwarded message ----------
Date: Fri, 14 Aug 2009 14:24:39 +0200
From: Marcus Moeller <mail@marcus-moeller.de>
To: CentOS mailing list <centos@centos.org>
Subject: [CentOS] Kernel NULL pointer vulnerability
Hi all.
Julien Tinnes and Tavis Ormandy from the Google Security Team have
recently found a Linux kernel vulnerability which affects all 2.4 and
2.6 kernels since 2001 on all architectures. Please read the
announcement on LWM: http://lwn.net/Articles/347006/ for further
information about the vulnerability and the exploit which has been
provided by Brad Spengler (you will find updates on his twitter site).
The only workaroud that is known to me atm is to disable the affected
kernel modules (which should be handled with care as some of them may
provide necessary functionality in your operating environment):
echo "alias net-pf-3 off # Amateur Radio AX.25
alias net-pf-4 ipx # IPX
alias net-pf-5 off # DDP / AppleTalk
alias net-pf-9 off # X.25
# alias net-pf-10 off # IPv6
alias net-pf-23 off # IrDA
alias net-pf-24 # PPPoE
alias net-pf-31 off # Bluetooth" >> /etc/modprobe.conf
Best Regards
Marcus
_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
^ permalink raw reply [flat|nested] 2+ messages in thread
* Re: Kernel NULL pointer vulnerability: AX.25 module
2009-08-14 17:59 Kernel NULL pointer vulnerability: AX.25 module Curt, WE7U
@ 2009-08-26 17:16 ` Ralf Baechle DL5RB
0 siblings, 0 replies; 2+ messages in thread
From: Ralf Baechle DL5RB @ 2009-08-26 17:16 UTC (permalink / raw)
To: Curt, WE7U; +Cc: linux-hams
On Fri, Aug 14, 2009 at 10:59:00AM -0700, Curt, WE7U wrote:
> FYI: My CentOS 5.x systems appear to be ok. CentOS 4.x systems are
> supposed to be vulnerable. My OpenSuSE 11.x systems appear to be
> vulnerable but I'm only running AX.25 on one machine and only
> occasionally. Note that there's a type in the net-pf-24 line below
> also. Read the LWM link or Google for additional info. --we7u
>
> ---------- Forwarded message ----------
> Date: Fri, 14 Aug 2009 14:24:39 +0200
> From: Marcus Moeller <mail@marcus-moeller.de>
> To: CentOS mailing list <centos@centos.org>
> Subject: [CentOS] Kernel NULL pointer vulnerability
>
> Hi all.
>
> Julien Tinnes and Tavis Ormandy from the Google Security Team have
> recently found a Linux kernel vulnerability which affects all 2.4 and
> 2.6 kernels since 2001 on all architectures. Please read the
> announcement on LWM: http://lwn.net/Articles/347006/ for further
> information about the vulnerability and the exploit which has been
> provided by Brad Spengler (you will find updates on his twitter site).
>
> The only workaroud that is known to me atm is to disable the affected
> kernel modules (which should be handled with care as some of them may
> provide necessary functionality in your operating environment):
>
> echo "alias net-pf-3 off # Amateur Radio AX.25
No. AX.25 had the .sendpage methode in its ax25_proto_ops so is not
vulnerable to this attack. The same is true for NETROM and ROSE and for
all kernel versions since the sendpage method was introduced in 2.4.4.
Which btw doesn't changes why AX.25 should not be used on mission
critical system. There is a sufficient number of locking issues in the
code that I recommend avoiding that. These issues can only result in
panic, hangs or malfunction of the protocol state engine or minor resource
wastage but no priviledge escalation afaics.
Ralf
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2009-08-26 17:16 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2009-08-14 17:59 Kernel NULL pointer vulnerability: AX.25 module Curt, WE7U
2009-08-26 17:16 ` Ralf Baechle DL5RB
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox