/dev/mem exploit on Ubuntu

Ben Collins ben.collins at ubuntu.com
Wed Aug 1 20:26:53 UTC 2007


On Wed, 2007-08-01 at 15:00 -0400, Kristian Hermansen wrote:
> On 8/1/07, Ben Collins <ben.collins at ubuntu.com> wrote:
> > already have root on the system. It's basically a rootkit (unless I'm
> 
> So for instance, if you are a normal user, but are in the kmem group
> (gid=15), it is my assumption that you can still utilize this
> technique even though you are not root.  However, Ben, you are the
> kernel expert -- so you tell me :-)  I am also interested in any
> methods of kernel memory segmentation for Linux driver code.  Ie, what
> does the future hold in these respects...

If you give someone kmem group perms, you've given them your system (if
they know what they are doing). There's no reason I know of to give
someone these perms. It's mainly meant to chgrp a program to this group,
and make it sgid.

Your other question, I'm not sure how to answer. There are things like
stack-protector, and similar methods to protect kernel and userspace
from those sorts of exploits.

-- 
Ubuntu   : http://www.ubuntu.com/
Linux1394: http://wiki.linux1394.org/





More information about the ubuntu-server mailing list