Linux Users Face Risk From Kernel Vulnerability
The Linux kernel has potentially been at risk from a flaw that has been present in Linux since 2003, according to a new finding from security researcher Invisible Things Lab. And while the flaw has now been patched in the mainline Linux kernel, it's not clear yet if all Linux distros have implemented the patch -- potentially leaving them open to exploitation by attackers.
Security researcher Rafal Wojtczuk from Invisible Things Lab detailed the kernel flaw in a report (PDF format) released officially this week, although Linux developers and distros have been aware of the issue since at least June.
"A malicious authenticated client can force Xorg server to exhaust (or fragment) its address space," Wojtczuk wrote. "If running on Linux, this may result in the process stack top being in an unexpected region and execution of arbitrary code with server privileges (root)."
Invisible Things Labs CEO Joanna Rutkowska added in a blog post that the unpatched flaw could have enabled any GUI application that could be compromised -- a PDF viewer, for example -- to bypass Linux security and potentially take over the system. Rutkowska is well known in the security community for her Black Hat research into Windows Vista and Intel security issues.
Although the vulnerability came to public light only this week, Linux developers and distros have been working for weeks to tackle the problem, which was first detailed in a June bugzilla entry for Linux vendor Red Hat, which credits Wojtczuk as the original reporter.
So far, though, only some progress has been made in closing the hole, known officially as CVE-2010-2240. Linux founder Linus Torvalds comitted a patch for the issue on Friday, and Linux kernel developer Greg Kroah-Hartman that same day formally announced the 126.96.36.199 Linux kernel release, advising all users to update.
Return to green news headlines
View Green News Archive