Home Business IT Open Source Kernel developer criticises Linux over security
Kernel developer criticises Linux over security Featured

Subscribe now and get the news that matters to your industry.

* Your Email Address:
* First Name:
* Last Name:
Industry:
Job Function:
Australian State:
Country:
Email marketing by Interspire
weebly statistics

A senior Linux kernel developer has pointed to an instance of what he calls a lax approach to security in the Linux kernel, citing the case of a serious vulnerability that is now more than a month old and is yet to be fixed.

Jonathan Corbet (pictured above), who is also the editor of the Linux Weekly News website, described in an article how a flaw in the kernel, which was initially discussed on a private mailing list, had been made public with a posting by a developer named Oleg Nesterov.

According to Corbet, the vulnerability in question would permit the running of arbitrary code in kernel mode.

"It seems that the Linux implementation of the ptrace() system call contains a race condition: a traced process's registers can be changed in a way that causes the kernel to restore that process's stack contents to an arbitrary location," he wrote.

Corbet raised the issue in the context of a discussion of other kernel vulnerabilities and criticism, by a security-oriented firm Trustwave, of the way these were handled. The firm claimed that it took nearly three years to patch two flaws, claims which Corbet contested.

But in the case of the vulnerability that he himself cited, Corbet said the bug was known to be a serious one from the outset and that one of the developers who reported it had also created exploit code to demonstrate its severity.

He said that though the public discussion of this bug was nearly a month old at the time of writing - his article appeared on February 19 - and had been discussed for a while before that privately, no distributor had taken a step to issue a fix.

Nesterov works for Red Hat and Corbet quoted another developer as asking why this company had not handled the issue as it should have been.

"Distributors knew about the problem and had time to respond to it — but that response did not happen in a timely manner," Corbet concluded.

"The ptrace() problem will certainly be straightened out in less than three years, but that still may not be a reason for pride. Users should not be left wondering what the situation is (at least) one month after distributors know about a serious vulnerability."

PROTECT YOURSELF AGAINST BANDWIDTH BANDITS!

Don't let traffic bottlenecks slow your network or business-critical apps to a grinding halt. With SolarWinds Bandwidth Analyzer Pack (BAP) you can gain unified network availability, performance, bandwidth, and traffic monitoring together in a single pane of glass.

With SolarWinds BAP, you'll be able to:

• Detect, diagnose, and resolve network performance issues

• Track response time, availability, and uptime of routers, switches, and other SNMP-enabled devices

• Monitor and analyze network bandwidth performance and traffic patterns.

• Identify bandwidth hogs and see which applications are using the most bandwidth

• Graphically display performance metrics in real time via dynamic interactive maps

Download FREE 30 Day Trial!

CLICK TO DOWNLOAD!

ITWIRE SERIES - IS YOUR BACKUP STRATEGY COSTING YOU CLIENTS?

Where are your clients backing up to right now?

Is your DR strategy as advanced as the rest of your service portfolio?

What areas of your business could be improved if you outsourced your backups to a trusted source?

Read the industry whitepaper and discover where to turn to for managed backup

FIND OUT MORE!

Sam Varghese

website statistics

A professional journalist with decades of experience, Sam for nine years used DOS and then Windows, which led him to start experimenting with GNU/Linux in 1998. Since then he has written widely about the use of both free and open source software, and the people behind the code. His personal blog is titled Irregular Expression.

Connect