back to article Major Linux security glitch lets hackers in at Claranet

A major security vulnerability in the Linux kernel, which was revealed on Sunday, has claimed its first confirmed UK victim in business ISP Claranet. Hackers used a bug in the sys_vmsplice kernel call, which handles virtual memory management, to gain root privileges and replace Claranet customers' index.html files with the …

COMMENTS

This topic is closed for new posts.

Page:

  1. Adam Williamson
    Thumb Down

    Oh, the crap is flying here. Tim and others, re disclosure.

    For the benefit of Tim and others:

    yes, this case is slightly unusual - because there was public disclosure before the bug was fixed (albeit by a couple of days; most distributors had official updates available Tuesday).

    Yes, Tim, we have a perfectly mature private disclosure system for Linux security issues. There is an established process whereby serious security issues are privately disclosed by security researchers to other security researchers, the developers of the affected component, and distributors.

    The issue is then verified, fixed, the fix is tested, and the public disclosure is made at the same time as the patches are made available by the upstream developers and by distributors.

    In this case, the issue leaked to the public slightly prematurely, no-one knows how yet, AFAIK. Usually, there would be zero window between the public disclosure of the vulnerability, and the availability of official updates.

    Usually, security researchers only break this process when they don't believe the issue is being worked on sufficiently urgently, which isn't ever the case for kernel security issues, which are always handled as a very high priority by the kernel developers.

    (Compare to Microsoft's "once a month, you get to be slightly secure!" policy).

    And for the most recent AC, they *really* ought to be using separate virtual machines for each user in a hosting setup. Or at least chroot jails. As someone earlier pointed out. This is at least 60% the fault of bad setup on Claranet's part (as most compromises usually are, for any OS).

  2. Adam Williamson

    Jay:

    except that the Ubuntu disc you installed comes with a complete set of applications for doing just about everything (all of which need patches), and Windows comes with...er...IE. And Paint.

  3. Andrew
    Linux

    Wasted half my coffee reading the comments.

    "if operating systems were compared to, say, a mosquito net, Linux would be a mosquito net with a few small holes in it, while Windows would be a mosquito net made from chicken wire."

    "whilst MS will develop and thoroughly test the patch behind closed doors"

    Managed to spray coffee over the monitor on two occasions. Funniest comparison of windows to linux I've heard in a long time. While I'm not sure what planet Tim was on when writing the second comment. I've lost track of the times I've had roll back patches after MS Auto update ignored the settings and installed a patch onto a production server that promptly broke half the other software running on it or restarted the server in the middle of a backup run (Auto updates were set to ask before downloading or installing). While the recent debacle with Office, where a service pack stopped it from opening its own files, had the technical team dreading the phone ringing with another client moaning as they could no longer open their word documents. How the hell did that make it through "thorough testing".

    I use both Windows and Linux for work and home. I use the one thats best for what I need, however I find myself cursing MS stupidity more and more lately while having less and less support calls from the clients using linux (desktop and server roles).

    Nice one to the developers for getting the fix out so soon after the disclosure of the vunerability, rather than trying to bury the existence of it while taking months to develop the necessary patch.

  4. Colin Wilson
    Pirate

    Windows updates vs linux (any flavour)

    The talk about the number of updates between the two systems, and the relative security offered by both need to be looked at in context.

    Take two machines...

    1) Install the standard WinXP (first release, not SP2, which was basically a complete re-write - or for that matter, use SP2, it still has holes) - DON'T use a seperate firewall, virus checker, or spyware detection, and don't bother updating - most users are still too dumb to bother - if you're really brave (should that be stupid?) try browsing a few salubrious sites.

    2) Install linux (pick a flavour, any flavour). Don't update etc as above.

    Stick both online, and see how long they last before they're completely owned by an unknown third party.

    Going back 2 years or so, the lifespan of a "virgin" XP box was down to about 8 seconds of first being connected to the internet before it was well and truly rogered and turned into someone elses' bot-bitch.

    If the linux machine lasts more than that, you have your winner.

  5. michael
    Stop

    statistics, more statistics and bull

    This my OS is better than your OS ego tripping that goes on is getting very very boring.

    The simple fact is that If the most popular operating system in the world was Linux, then all the hackers would be focusing on it instead of windows and I bet alot of vulnerabilities would crop up just as we see in windows all the time.

    P.S. I use both.

  6. heystoopid
    Linux

    The wonders of open source

    The wonders of open source and the marvel at just how quick the security fixes come rather than the usual six to ten month wait from the Redmond Campus mob or the questionable thieves out Cupertino way who pay lip service to GPL for their operating systems !

  7. Patrick
    Stop

    Windows in perspective.

    Just for perspective, Vista SP1 fixes 551 bugs (rolling in 551 separate hot fixes) and 23 security updates alone. Just something to keep in mind while comparing the security problem of Windows to Linux or to OS X or to xyz alternative.

  8. Anonymous Coward
    Anonymous Coward

    Linux is unsafe

    and Windows is safe. The fact that most servers around run Linux, and most botnet zombies run Windows might be a clue. Or not?

    But no system is 100% foolproof. That's why they should have been using a less recent kernel probably. The main difference between Win and Lin on this ground is that testing/unstable thingies are labeled as such in the open source community, as opposed to MS who sell their beta stuff as stable, and discontinue them as soon as they are stable (if and when it ever happens).

  9. Andrzej
    Gates Halo

    Message to Jay

    @Jay

    XP SP1- updates from 24 security bulletins and 297 hotfixes

    XP SP2- 60 security bulletins and a whopping 666 (no, I did not make that number up) fixes

    Now do some basic math (hopefully your math skills are better than your IT knowledge) and add 297+ 666 + 60(taking your word on this) = 1023 +/-

    Another windowz n00b skooled.

  10. John Benson
    Flame

    Half a league, half a league, half a league onward...

    Into the Valley of Death plunged the bug hungry.

    So Linux has a bug, I guess that proves it's inferior.

    As to closed source versus open source, some of the arguments sound like "what you don't know (without a disassembler) can't hurt you". In other circles this is known as "security through obscurity" and generally avoided on principle.

    In my personal experience I've seen a lot more BSODs than kernel panics, but your mileage may vary.

    I'm also noticing that CentOS 5 seems a lot more solid than Fedora 8 (well, duh). So it's probably fairer to compare boring, stable, old, patched releases of Linux to boring, stable, old, patched releases of Windows.

    I think it's perfectly fine to say "I like Linux/Windows because..." without feeling compelled to add "because Windows/Linux is a cartful of nightsoil, that none abideth the stench thereof."

    (If I do, however, it's because the Devil made me do it...)

  11. Anonymous Coward
    Anonymous Coward

    If the OS market share split was 50 50...

    between Linux and Windows, you would still find more exploits in Windows.

    It is beginner usability versus security that is the main reason windows is open to exploit. Open source does enable security flaws to be found earlier, and people do wade through the kernel code, and the netfilter code checking security all the time. Applications depending on what they are may not get the advantage of Open Source security reviews, and of course obfuscation does work well with security tools, but you add a risk of introducing an error.

    MS engineers tend to focus more on the UI and the end user experience, the tech crowd are on Unix where there is more emphasis on good security practice, though of course things do slip through the net.

    If you really want security OpenBSD is probably the OS you want, unless you want to harden Linux yourself. But, look what OpenBSD does to your usability. There is some truth about the OS not being the be all and end all, but a tank is more secure than a bicycle on balance :)

    I thought the honeymoon period was over with Linux, the number of actual exploit attempts has been on the increase, I think we have inherited the Windows crackers :) There was a time period where people would not deliberately target Linux because of their own use and like of the OS, those days appear to be gone now.

    There are loads of security flaws found all the time in Linux - but not all are critical and they tend to get patched fast and I suppose you should practice security in-depth, but it is very hard to make a usable multi purpose hardened system.

  12. Dave

    @Jay

    Your XP fixes were solely to the OS and probably required multiple reboots (although MS are getting better about that now), the Linux stuff not only includes the latest OS fixes but application fixes as well (not all of them are fixes, some are features).

  13. Rich Turner
    Alert

    MS not as often to blame as you may think!

    One of the biggest problems with Windows is it's popularity. Quite honestly, by far the biggest threats to your Windows based PC is running crappy software from verious sources that don't take security and reliability seriously. Good examples include Real, Adobe, Sun and Apple ... as evidenced on the Secunia site today (see below).

    It doesn't matter what the OS is ... if it's pretty much #1 then chances are that it's going to see the largest volume of hackery. Just be glad Linux isn't the world's most used OS!

    From Secunia (2/14/2008):

    During the last 24 hours, we have seen security updates for some very popular Windows programs from four major vendors: Sun, Adobe, Apple, and Skype.

    Based on these four security updates, we have gathered some statistics from our free Secunia PSI that shows a startling picture, detailing the amount of users who need to patch their computers, in order to safely do something as ordinary as surfing the Internet.

    Currently, the Secunia PSI has been installed on 282,726 computers.

    Unique installations, counting each application only once per. computer:

    Adobe Reader 8.x 172,653 61.07% of all computers affected

    Apple Quicktime 7.x 133,169 47.10% of all computers affected

    Sun Java 1.5.x 98,618 34.88% of all computers affected

    Skype 3.x 57,496 20.34% of all computers affected

  14. Anonymous Coward
    Alert

    Just a point

    Linux flaws appear every week without fail, they just don't get reported as often as windows flaws as sites like this seem to be going along with the 'MS is evil' bandwagon.

    As for comments like

    '2.6.23 is a very new kernel to be running in a production environment'

    For quite a while now, linux users have been crowing about how quickly things get fixed and their system automatically updates itself with the patches, while complaining about automatic updates from MS. Seeing as this is a new kernel, it's more than likely that the sysadmins had auto update enabled to save themselves time and effort so what's the difference between that and what MS offer? They both screw up occasionally.

    Nothing is perfect

  15. Anonymous Coward
    Pirate

    MS engineers tend to focus more on the UI and the end user experience ...

    Total utter and complete rubbish. Sorry, but you're utterly wrong here. For the vast majority of MS product groups, the internal guts of our apps and systems get FAR more attention than do the UI.

    The difference between Microsoft and the Linux world, however, is that Microsoft gives a damn and does spend considerable effort making their apps and systems easy to use, easy to manage and easy to support.

    A good example of this is that no Windows user has to recompile their OS' kernel to apply a patch.

    And when it comes to patching issues in the OS ... the fact that the Linux community releases patches to it's kernel within a day or two of fixing an exploit clearly illustrates that you don't run full test and regression suites against your patched kernel. That's left to the distribution owner. And they rarely do this either because it takes care, time and money ... something that most distro's owners are relatively loath to give up. This IS a benefit of Windows - you can be considerably more sure that a fix doesn't break you, and if it does then it's for a damn good reason.

    And to your latter point ... there are tons of vulnerabilities found in practically every OS in use today, and yes, not all are even interesting, let alone fatal. This applies to Windows too.

  16. Smitty Werben Jueger Man Jenson
    Unhappy

    new banned worf for El Reg

    'Fanboi"

    Seriously. If this keeps up we will all start spelling like an AOL chatroom full of 12 year olds.

  17. tardigrade
    Linux

    @AC Patching and all that.

    "Seeing as this is a new kernel, it's more than likely that the sysadmins had auto update enabled to save themselves time and effort so what's the difference between that and what MS offer?"

    Just a small point to explain. The update software used 'apt' or 'yum' by default doesn't auto upgrade the Kernel. To do that you would usually have to manually force a kernel update.

    A standard distro of debian will have a cron job set to call apt-get each night to update using 'stable' lists and 'security update' lists stored in /etc/apt/lists/. So you don't get bleeding edge updates that can cause breakerage nastyness from unstable lists but you do get security fixes by default if an 'issue' arises as in this case. Hence my server in now auto patched, but without forcing a Kernel update to a bleeding edge version. :)

    Apt is one of the smartest tools that I've seen on any platform for this purpose. If it can't resolve dependency issues without breaking another app then it will skip to the next update and leave you a message in the system logs to tell you what it didn't want to do. Hence my custom BIND and Sendmail hacks don't get wiped out by the auto-update process each time a newerer 'stable' version of said app is released.

  18. david Silver badge

    Local root exploits

    "I'm not sure it makes sense to compare with Windows.

    "Does Windows even attempt to protect itself against untrustworthy local users?

    This is the thing: all Linux/BSD users I know work from a position of deep ignorance like this.

    Some of my best friends are Linux/BSD/Solaris administrators. I don't expect them to master two operating systems. They try not to boast about their ignorance.

  19. Anonymous Coward
    Boffin

    @Slackware has

    > the patched Kernel available now I would suggest getting it and installing it. If your

    > lucky enough to be using Slackware.

    Or you could go completely spartan and build the latest 2.6.24.2 kernel yourself. I did that two days ago with my Debian Sid machine (yes, I'm that insane to run something that experimental).

    As for perfection, nothing is perfect. Linux does have flaws here and there. So does Windows, Mac, etc.

  20. Dan
    Boffin

    Correction?

    There are TWO PoC's floating around, making 2.6.17 onwards vulnerable.

    One is for the issue introduced between 2.6.23 ~ 2.6.24 (Diane Lane).

    The other is for 2.6.17 ~ 2.6.24.1 (Jessica Biel).

  21. Anonymous Coward
    Anonymous Coward

    @ Total Utter and Complete Rubbish

    I am guessing you are an American - reread what you quoted :

    'MS engineers tend to focus more on the UI and the end user experience.'

    and then combine it with your statement:

    'A good example of this is that no Windows user has to recompile their OS'[sic] kernel to apply a patch.'

    See there is a tendency (which is an interesting English word), to worry more about the end user experience, and I think you have proved it.

    The UI is not just a GUI, it is how the user interacts with a system. From what I can see I am actually being a bit charitable I don't really rate the UI of Windows that highly - so you can only imagine what I think about the internals.

  22. Quirkafleeg
    Boffin

    Re: Linux is more secure - not completely secure

    “It only effects the 2.6.23 kernel”

    How does it cause a kernel? Do tell.

    Anyway, 2.6.22.18 was also released on Monday, with a similar fix for the same bug (the fact that it wasn't the same fix drew some comment on the kernel mailing list). 2.6.21.*, which is also vulnerable, is no longer maintained by the kernel people so no fixed kernel has been released on kernel.org – DIY patch, or wait for your distribution to provide an update. Same goes for other kernels back to 2.6.17.

  23. David
    Linux

    @"MS engineers tend to focus" AC

    "A good example of this is that no Windows user has to recompile their OS' kernel to apply a patch."

    No. But I've never compiled a single program on Linux, and yet I've been running it for years.. (for that matter, I've serviced many Linux installations, and am yet to see a single virus or piece of spyware or other malware.. whereas I've seen thousands for windoze, often on a single machine)

    "And when it comes to patching issues in the OS ... the fact that the Linux community releases patches to it's kernel within a day or two of fixing an exploit clearly illustrates that you don't run full test and regression suites against your patched kernel. That's left to the distribution owner. "

    True, but...

    "This IS a benefit of Windows - you can be considerably more sure that a fix doesn't break you, and if it does then it's for a damn good reason."

    Actually, again, I've never had a patch on Linux break anything. Nor have I heard of that happening, although it is likekly to happen eventually I guess. Whereas the reason i dumped that piece of foul shit known as "Vista" and installed XP a couple of weeks back is that an update to vista killed my favourite game (which is windoze only, for the moment), and a later update killed all the networking so no chance of further updates. So because windoze patches broke the whole system. I guess by locking out all networking it did make it more secure but....

    Oh.. And the fact that m$ takes months and so forth to test the patches means that it takes months for a vulnerability to be fixed from the time it is discovered, whereas with Linux, generally you're looking at a few days..

    m$ better? Only for making me enjoy using Linux.

    (Oh, and thanks for vista. Really. The best windoze ever! I am getting to convert so many people to Linux because it is so rubbish! I really appreciate you guys putting that out like you did. Honest!)

  24. Anonymous Coward
    Anonymous Coward

    @AC 14 Feb 23:44

    If you really are an MS employee ("our apps and systems") you've done your employer no favours, all you've done is confirm that you're clueless, which (in many people's experience) is fairly typical of MS employees... Like other posters, I've been using Linux for a while, e.g. Red Hat on and off since RH4, SuSe since SuSe 8, and not once have I needed to recompile a kernel.

    Yes I sometimes read about kernel patches to enable particular bleeding edge functionality but these are things that Joe Public or even Joan Corporate IT Department does not have to do. If you don't understand the difference, try popping along to your local Linux User Group for some enlightenment.

    Take some of your spare Vista CDs along too, they may find a use as drinks mats, 'cos Joe and Joan aren't interested in buying them are they.

    "MS ... apps and systems easy to use, easy to manage and easy to support."

    That's your opinion. I don't share it, and once you move out of the netherworld of Microsoft-funded consulting opportunities, a lot of other people don't share it either.

    "patches to it's kernel within a day or two of fixing an exploit "

    Hmmm. Having business-critical patches tested by distro builders doesn't suit MS needs this week then? Well given that was pretty much the approach MS initially tried with Windows DataCentre Edition (want a critical patch for DataCentre Edition on your Compaq Proliant?Only Compaq can provide it (ditto HP, Dell, etc) and there may be a delay of some months while the critical patch is "qualified" by the DataCenter OEM), perhaps you can enlighten us on whether MS still see that as an appropriate route to the user base for critical updates on enterprise-class systems? Or maybe MS accepted that Windows really doesn't belong in proper enterprise-class datacentres, 'cos that's what anyone with a clue knows?

  25. David
    Linux

    A good reason?

    "This IS a benefit of Windows - you can be considerably more sure that a fix doesn't break you, and if it does then it's for a damn good reason."

    So I guess MS has "a damn good reason" for disabling poor ol' Gus Bains's sound?

    See http://www.theregister.co.uk/2008/02/13/patch_tuesday_february/comments/#c_155002

    :)

  26. David
    Linux

    Another good reason?

    "This IS a benefit of Windows - you can be considerably more sure that a fix doesn't break you, and if it does then it's for a damn good reason."

    Also there's that other "David" a couple of messages below that? (Although having Nortons, his machine was probably pretty well broken anyway! :) )

    Again, see :)

    http://www.theregister.co.uk/2008/02/13/patch_tuesday_february/comments/#c_155002

Page:

This topic is closed for new posts.