Kernel local privilege escalation vulnerability present for 7 years

The latest Linux kernel git now has a fix for CVE-2018-8781 which has allowed local privilege escalation on GNU/Linux systems for SIX YEARS. The vulnerability was introduced in Kernel 3.4 and has been present ever since.

>have local access to GNU/Linux system
>have DisplayLink DRM adapter
>get full read/write permission to physical pages
>execute all the code you want in kernel space

This is specially worrying for co-located servers and things like that where someone could be the janitor or dress up as the janitor and exploit your system given that they first have a regular account.

Attached: radeontop-no-keumjo.png (814x481, 16K)

Other urls found in this thread:

cve.circl.lu/cve/CVE-2018-8781
patchwork.freedesktop.org/patch/211845/
research.checkpoint.com/mmap-vulnerabilities-linux-kernel/
twitter.com/NSFWRedditGif

Why would you have a display link driver on a headless server?

...because you installed your average distribution which is compiled with CONFIG_DRM_UDL set to m?

This module is present on your system unless you compiled your own kernel. You can check it out for yourself, see if you have udl.ko is found in /lib/modulds/-kernelversion-/kernel/drivers/gpu/drm/udl/udl.ko
It's not automatically loaded unless you actually have a displaylink adapter plugged in but if you do and you have a normal local user account then you win

>have DisplayLink DRM adapter
>DRM
there is your problem

Attached: Peterson.jpg (168x300, 15K)

>Direct Rendering Manager

That's not my problem

Attached: Screenshot_2018-04-27_23-45-33.png (2560x1440, 389K)

it's not what you think it is

Where is redhat when we need them

source

that's what (((they))) want you to think

It's in OP, it's CVE-2018-8781
cve.circl.lu/cve/CVE-2018-8781
patchwork.freedesktop.org/patch/211845/

Attached: screenfetch-keumjo-2018-05.png (1094x337, 12K)

>Those fugly fonts
I hope you don't work on that machine

Oy Vey, the kernel developers found another (((bug))). Don't worry goy, it was a coding mistake.
Btw linus, please merge this 300 lines of code, it'll give you better speed. Don't worry.

Attached: hdJ6wWR.png (183x232, 20K)

what terminal font would you recommend, then?

got to admit, I've used terminus for like a decade and haven't thought much about it since I started using it

so I'd have to load the module as root to do the exploit?

source is research.checkpoint.com/mmap-vulnerabilities-linux-kernel/

btw:
> 18 March 2018 – Vulnerability was disclosed to the Linux Kernel.
> 18 March 2018 – Linux issued a patch and asked for us to verify it.
> 18 March 2018 – We verified the patch and gave a “Green light” to continue.
> 21 March 2018 – An official Linux patch was issued for CVE 2018-8781.
> 21 March 2018 – The patch was integrated to the Linux Kernel.

Well, yes, but not really. As good as all distributions have module autoloading enabled so connecting a displaylink adapter would be enough to make the kernel load it. So it's bad. But I do feel compelled to point out that if you have physical access to a computer you're generally able to grab it and run or open it and clone the harddrive.

nice link/find.

what is displaylink drm adapter?

Attached: brat?.png (386x406, 177K)

Module autoloading on anything that needs security it's retarded

>have local access
compromised by default

why are waifufags always dumb

Never seen a DisplayLink adapter. It's some shitty properiatary USB display technology.

It's a very basic USB "graphics card" adapter, you plug it into your computers USB port and connect a monitor (or two, even) to the adapter and you're set to go. It's fine for simple 2D tasks. There's USB 3.0 adapters around $100 that do dual 4k at 60Hz.

That's nice but it is the default setting on all the distributions. And it's nice that you can plug-in a USB HDD or connect a printer and it works and you don't have to spend hours figuring out what modules are required.

Attached: Plugable USB-VGA-165.jpg (1000x700, 38K)

grep UDL /boot/config-4.14.38
# CONFIG_DRM_UDL is not set
# CONFIG_FB_UDL is not set
wew, that was close

Brb, emerging and compiling a newer kernel

Thats why Gento is a loot better security, storage and performance-wise

There is some font which could be better

If someone have physical access to your PC, than it's not your PC.

> 3 day turn around on an issue that affects nobody of importance
God damn I love Linux

So glad I use gentoo and don't load bullshit modules

I actually strongly disagree with this - heavily depending on the case. Some can and do setup Gentoo very securely. Most just "install gentoo" and don't even configure a firewall because they don't know how and don't know what the commands they typed into a terminal when they installed it did either.

That's it. I'm switching back to macOS.

Even consolas is better.

Just propose a really good one, just name a console font to try.

don't listen to the homos, terminus a best

Attached: Screenshot_20180416_183823.png (598x415, 6K)

>have local access to GNU/Linux system
well there's your fucking problem

Physical access security bugs are bugs, they should be fixed.
But really, it's far from being a serious bug. Why would a hacker go through such lengths to exploit that bug instead of you know, booting with a flash drive or something and changing whatever he wants? He has physical access.

Lennart Poettering is on the case user, don’t worry.