Linux Kernel Exploit Affecting Linux 3.3 To Linux 3.8

Written by Michael Larabel in Linux Kernel on 25 February 2013 at 02:36 PM EST. 66 Comments
LINUX KERNEL
A Linux kernel exploit was made public this weekend that affects versions of Linux going back to the 3.3 kernel. This exploit allows for user-space programs to gain root access through a bug in the kernel's networking code.

As reported on Sunday with a CVE request, "An unprivileged user can send a netlink message resulting in an out-of-bounds access of the sock_diag_handlers[] array which, in turn, allows userland to take over control while in kernel mode."

It appears that individuals have been exploiting this kernel bug for some time. The bug was known to exist privately going back to mid-2012 but wasn't corrected until Saturday with these net patches.

The issue will be addressed in the Linux 3.9 kernel and should make it back to the latest stable point releases of the affected Linux kernel series.
Related News
About The Author
Michael Larabel

Michael Larabel is the principal author of Phoronix.com and founded the site in 2004 with a focus on enriching the Linux hardware experience. Michael has written more than 20,000 articles covering the state of Linux hardware support, Linux performance, graphics drivers, and other topics. Michael is also the lead developer of the Phoronix Test Suite, Phoromatic, and OpenBenchmarking.org automated benchmarking software. He can be followed via Twitter, LinkedIn, or contacted via MichaelLarabel.com.

Popular News This Week