Linux Kernel Bug Reclassified as Security Issue After Two Years (Multiple distros affected)

LASER_oneXM

Level 37
Thread author
Verified
Top Poster
Well-known
Feb 4, 2016
2,520
Multiple Linux distros are issuing security updates for OS versions that still use an older kernel branch after it recently came to light that a mild memory bug was in reality much worse, and the bug was recently categorized as a security flaw.

The original bug was discovered by Michael Davidson, a Google employee, back in April 2015 and was fixed in Linux kernel 4.0.

Bug initially classified as non-security issue
An initial analysis of the bug did not explore the possibility of it being used as an attack vector, so the issue was one of many bugfixes included with the newly launched (at the time) Linux kernel 4.0.

Linux kernel maintainers also ported the patch to the older 3.x branch with the release of Linux kernel 3.10.77, but because the issue had been branded as a minor bugfix, the bug wasn't included in many Linux LTS releases.

Long-Term Releases are Linux OS versions deployed in enterprise and high-availability environments, and in most cases, they receive security-only updates, as not to pester sysadmins with constant updates that cause downtime or other production snags.

This means that while the majority of Linux desktop users running a recent kernel are not affected by this vulnerability, being patched a long time ago, some critical server systems might still be vulnerable if they're still running an older 3.x kernel as part of a Linux LTS distro.

"All versions of CentOS 7 before 1708 (released on September 13, 2017), all versions of Red Hat Enterprise Linux 7 before 7.4 (released on August 1, 2017), and all versions of CentOS 6 and Red Hat Enterprise Linux 6 are exploitable," the Qualys team said in an advisory released today after it made sure to inform all major Linux distros of the bug's real nature a few months ago.

Bug allows Elevation of Privileges (EoP)

The bug's security implications only recently came to light after further analysis from the Qualys team. Researchers discovered that an attacker could exploit the 2015 kernel bug to elevate privileges for an attacker's code.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top