Five Year Old Flaw Fixed In Linux Kernel

Linux kernel developers have discovered and patched a vulnerability that had been present in the code for the past five years.

CVE-2014-0196 is a serious code-execution bug that could allow the attacker to run malicious code on vulnerable systems, or simply crash them. Due to its properties, it is especially dangerous to computers in a shared hosting environment.

Now, the fix needs to make its way into various Linux distributions, with Ubuntu among the first to report compliance.

It’s been a long time

The vulnerability in the ‘pseudo tty’ (pty) device, discovered by Jiri Slaby, was introduced into the Linux kernel in version 2.6.31-rc3 which was released way back in 2009. It allows the attacker to corrupt memory to cause denial of service, or gain administrator privileges to enable data theft.

Dan Rosenberg, a senior security researcher at Azimuth Security, told Ars Technica that it could also be used in multi-stage attacks that exploit a variety of bugs and give the attacker complete control over a target system.

Rosenberg added that this could be the most serious bug discovered in the kernel code for a few years.

Since the vulnerability requires the attacker to have a local user account, it poses a particular threat to shared public cloud servers.

According to Marsh Ray, an authentication expert at Microsoft, the vulnerability also affects non-Linux projects based on the kernel, including Android and ChromeOS.

Canonical has already released a relevant patch for Ubuntu, while Red Hat said its Enterprise Linux 5 does not contain the vulnerability. A patch for RHEL 6 is currently in development. Debian said these problems have been fixed in version 7 of its distribution codenamed ‘Wheezy’, but still remain in the unstable version codenamed ‘Sid’.

System administrators are advised to update their Linux distributions as soon as possible. You can see a proof-of-concept exploit based on CVE-2014-0196 here.

Last month, security researchers patched a serious vulnerability in the popular OpenSSL cryptographic library that they say has left its users exposed for more than two years.

How well do you know open source software? Take our quiz!

Max Smolaks

Max 'Beast from the East' Smolaks covers open source, public sector, startups and technology of the future at TechWeekEurope. If you find him looking lost on the streets of London, feed him coffee and sugar.

Recent Posts

Virgin Media O2 To Invest £700m To ‘Transform’ 4G, 5G Network

Virgin Media O2 confirms it will invest £2m a day for new mobile masts, small…

2 days ago

Tesla Cybertruck Deliveries On Hold Due To Faulty Side Trim

Deliveries of Telsa's 'bulletproof' Cybertruck are reportedly on hold, amid user complaints side trims are…

2 days ago

Apple Plots Live Translation Option For AirPods – Report

New feature reportedly being developed by Apple for iOS 19, that will allow AirPods to…

2 days ago

Binance Token Rises After Trump Stake Report

Binance BNB token rises after WSJ report the Trump family is in talks to secure…

3 days ago

iRobot Admits ‘Substantial Doubt’ Over Continued Operation

After failed Amazon deal, iRobot warns there is “substantial doubt about the Company's ability to…

3 days ago

Meta’s Community Notes To Use X’s Algorithm

Community Notes testing across Facebook, Instagram and Threads to begin next week in US, using…

3 days ago