Page 1 of 1

privilege escalation kernel hack ( CVE-2016-0728 )

PostPosted: Jan 20th, '16, 08:53
by jiml8
This one looks potentially very serious, though apparently there is no known exploit in the wild yet.

I am sure the Mageia team will get this patched as soon as upstream has a patch in place.

http://www.pcworld.com/article/3023870/ ... vices.html

Re: privilege escalation kernel hack

PostPosted: Jan 20th, '16, 18:59
by AstorBG
I hope the kernel developers patch it soon.
Here is more info for the exploit and demo:
http://perception-point.io/2016/01/14/a ... 2016-0728/

Re: privilege escalation kernel hack

PostPosted: Jan 20th, '16, 20:03
by jiml8
I compiled and ran the exploit on my workstation, and here is the result:
Code: Select all
uid=501, euid=501
Increfing...
finished increfing
forking...
finished forking
caling revoke...
uid=501, euid=501
jiml@dadsbox:jiml> whoami
jiml


In other words, it did not work.

Re: privilege escalation kernel hack

PostPosted: Jan 20th, '16, 20:14
by jiml8
Turns out that a couple of kernel modules are not at the addresses listed in the demo exploit code. I have recompiled with the correct addresses for my running kernel, and I am trying the exploit again.

For reference, you can find the static location of kernel modules using "cat /proc/kallsyms"

Re: privilege escalation kernel hack

PostPosted: Jan 20th, '16, 20:54
by jiml8
Exploit did not work, even with correct module addresses.

This is kernel 4.1.15-desktop-1.mga5

Re: privilege escalation kernel hack

PostPosted: Jan 20th, '16, 21:23
by marja
Our kernel maintainer, tmb, knows about this vulnerability and already started patching the Mageia 5 kernels.
QA team will test the kernels as fast as possible, so they can be released as regular updates when QA team sees they don't have regressions.

Re: privilege escalation kernel hack

PostPosted: Jan 20th, '16, 22:56
by doktor5000

Re: privilege escalation kernel hack ( CVE-2016-0728 )

PostPosted: Jan 21st, '16, 12:20
by AstorBG
Excellent! Thanks guys!
That was promptly handled.

Re: privilege escalation kernel hack ( CVE-2016-0728 )

PostPosted: Jan 21st, '16, 14:42
by marja
After testing, the fixed kernels were pushed as regular updates for Mageia 5 over six hours ago.
However, some mirrors have problems syncing atm. If you don't get the update, you might want to select an up-to-date mirror (the green ones for Mga5 in this list http://mirrors.mageia.org/status)

Re: privilege escalation kernel hack

PostPosted: Jan 21st, '16, 16:04
by doktor5000
jiml8 wrote:I compiled and ran the exploit on my workstation, and here is the result:
[...]
In other words, it did not work.

Didn't work here too. Seems my PS1 checking the return code of the last command protected me :)


But in any case, fixes were already pushed:

http://advisories.mageia.org/MGASA-2016-0033.html (for regular kernel)
http://advisories.mageia.org/MGASA-2016-0032.html (for kernel-tmb)
http://advisories.mageia.org/MGASA-2016-0031.html (for kernel-linus)