{"id":2199,"date":"2009-08-19T09:15:47","date_gmt":"2009-08-19T13:15:47","guid":{"rendered":"http:\/\/blogs.n1zyy.com\/n1zyy\/?p=2199"},"modified":"2009-08-19T09:15:47","modified_gmt":"2009-08-19T13:15:47","slug":"linux-kernel-vulnerability","status":"publish","type":"post","link":"https:\/\/blogs.n1zyy.com\/n1zyy\/2009\/08\/19\/linux-kernel-vulnerability\/","title":{"rendered":"Linux Kernel Vulnerability"},"content":{"rendered":"<p>There&#8217;s been a lot of buzz around the recently-announced vulnerability in the Linux kernel.<\/p>\n<p>It appears to be less of an issue than some are making it out to be. (Though obviously, any remotely-exploitable privilege escalation bug is serious.) In particular, the Linux systems I run, which haven&#8217;t had anything out of the ordinary done to secure them, are all immune. CentOS 5, and presumably, RHEL, are not typically vulnerable, <a href=\"http:\/\/www.h-online.com\/security\/Critical-vulnerability-in-the-Linux-kernel-affects-all-versions-since-2001--\/news\/114004\">assuming that vm.mmap_min_addr is set greater than 0<\/a>, which is the default. (The <a href=\"http:\/\/lwn.net\/Articles\/347006\/\">initial announcement<\/a>, though, suggests that SELinux may override this functionality, creating an ironic situation in which people not running SELinux, like my lazy self, may be better off.)<\/p>\n<p>It was <a href=\"http:\/\/git.kernel.org\/?p=linux\/kernel\/git\/torvalds\/linux-2.6.git;a=commit;h=e694958388c50148389b0e9b9e9e8945cf0f1b98\">patched<\/a> six days ago, but this doesn&#8217;t mean that a patched kernel or CentOS update has become available.<\/p>\n<p>Check your systems, to be sure. But don&#8217;t assume that all Linux machines are inherently vulnerable. It appears that it can really only be exploited with shell access, and none of the systems I&#8217;ve tested are vulnerable even with that.<\/p>","protected":false},"excerpt":{"rendered":"<p>There&#8217;s been a lot of buzz around the recently-announced vulnerability in the Linux kernel. It appears to be less of an issue than some are making it out to be. (Though obviously, any remotely-exploitable privilege escalation bug is serious.) In &hellip; <a href=\"https:\/\/blogs.n1zyy.com\/n1zyy\/2009\/08\/19\/linux-kernel-vulnerability\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2199","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/posts\/2199","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/comments?post=2199"}],"version-history":[{"count":0,"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/posts\/2199\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/media?parent=2199"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/categories?post=2199"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/tags?post=2199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}