Back to article
Linux Users Face Risk From Kernel Vulnerability
Stubborn Kernel Flaw
August 19, 2010
Security researcher Rafal Wojtczuk from Invisible Things Lab detailed the kernel flaw in a report (PDF format) released officially this week, although Linux developers and distros have been aware of the issue since at least June.
"A malicious authenticated client can force Xorg server to exhaust (or fragment) its address space," Wojtczuk wrote. "If running on Linux, this may result in the process stack top being in an unexpected region and execution of arbitrary code with server privileges (root)."
Invisible Things Labs CEO Joanna Rutkowska added in a blog post that the unpatched flaw could have enabled any GUI application that could be compromised -- a PDF viewer, for example -- to bypass Linux security and potentially take over the system. Rutkowska is well known in the security community for her Black Hat research into Windows Vista and Intel security issues.
Although the vulnerability came to public light only this week, Linux developers and distros have been working for weeks to tackle the problem, which was first detailed in a June bugzilla entry for Linux vendor Red Hat, which credits Wojtczuk as the original reporter.
So far, though, only some progress has been made in closing the hole, known officially as CVE-2010-2240. Linux founder Linus Torvalds comitted a patch for the issue on Friday, and Linux kernel developer Greg Kroah-Hartman that same day formally announced the 220.127.116.11 Linux kernel release, advising all users to update.