View Issue Details

IDProjectCategoryView StatusLast Update
0001394Kali LinuxGeneral Bugpublic2015-08-18 12:45
Reporter9h05t Assigned Tomuts  
PrioritynormalSeveritymajorReproducibilityalways
Status closedResolutionno change required 
Platformx64OSKaliOS Version1.0
Product Version1.0.7 
Summary0001394: Linux Kernel Vulnerable!
Description

The latest kernel update for KALI LINUX is vulnerable to "futex subsystem call".An unprivileged user could use this flaw to crash the kernel (resulting in DOS) or for privilege escalation.Specifically, the futex syscall can leave a queued kernel waiter hanging on the stack. By manipulating the stack with further syscalls, the waiter structure can be altered.
Another is the "chkrootkit" the program which has used by many people to check for the rootkits

Additional Information

Linux Vulnerability:
http://seclists.org/oss-sec/2014/q2/469
ChkRootKit Vulnerability:
http://seclists.org/oss-sec/2014/q2/469

Activities

muts

muts

2014-06-07 16:07

reporter   ~0002058

Thanks for this report. We take our security fixes from Debian, and our repos update every 4 hours. This includes upstream fixes to the kernel.

9h05t

9h05t

2014-06-07 16:17

reporter   ~0002059

So are you fixing it or working on the patch?

muts

muts

2014-06-07 17:17

reporter   ~0002060

Last edited: 2014-06-07 17:17

Yes, in 3.14.5-1kali2 to be released soon.

Issue History

Date Modified Username Field Change
2014-06-07 16:02 9h05t New Issue
2014-06-07 16:07 muts Note Added: 0002058
2014-06-07 16:07 muts Status new => closed
2014-06-07 16:07 muts Assigned To => muts
2014-06-07 16:07 muts Resolution open => no change required
2014-06-07 16:17 9h05t Note Added: 0002059
2014-06-07 16:17 9h05t Status closed => feedback
2014-06-07 16:17 9h05t Resolution no change required => reopened
2014-06-07 17:17 muts Note Added: 0002060
2014-06-07 17:17 muts Status feedback => closed
2014-06-07 17:17 muts Resolution reopened => no change required
2014-06-07 17:17 muts Note Edited: 0002060
2015-08-18 12:45 g0tmi1k Priority immediate => normal