TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Linux kernel use-after-free in Netfilter, local privilege escalation

288 pointsby kuizuabout 2 years ago

9 comments

l33tmanabout 2 years ago
&quot;We developed an exploit that allows unprivileged local users to start a root shell by abusing the above issue. That exploit was shared privately with &lt;security () kernel org&gt; to assist with fix development. Somebody from the Linux kernel team then emailed the proposed fix to &lt;linux-distros () vs openwall org&gt; and that email also included a link to download our description of exploitation techniques and our exploit source code.<p>Therefore, according to the linux-distros list policy, the exploit must be published within 7 days from this advisory. In order to comply with that policy, I intend to publish both the description of exploitation techniques and also the exploit source code on Monday 15th by email to this list.&quot;<p>Interesting.. they didn&#x27;t write what conditions have to be met for it to be exploitable. Also interesting that someone screwed up and accidentally forwarded an email including the exploit to a broad mailing list...<p>Part of the nf modules are active if you have iptables, which you have if you run ufw (for example), so pretty broad exploit if that&#x27;s all that&#x27;s required, but the specific module in question in the patch, nf_tables, is not loaded on my Ubuntu 20.04LTS 5.40 kernel running iptables&#x2F;ufw at least.
评论 #35881173 未加载
评论 #35883156 未加载
评论 #35881197 未加载
评论 #35881220 未加载
评论 #35881382 未加载
explorer83about 2 years ago
Based on this 11 month old discussion this has been an exploit vector for sometime - <a href="https:&#x2F;&#x2F;groups.google.com&#x2F;g&#x2F;linux.debian.bugs.dist&#x2F;c&#x2F;ZF9rWY3DR5w" rel="nofollow">https:&#x2F;&#x2F;groups.google.com&#x2F;g&#x2F;linux.debian.bugs.dist&#x2F;c&#x2F;ZF9rWY3...</a><p>&quot;I vaguely recall at least around 6-7 such holes, and a quick google search seems to reveal that at least those would have been mitigated by unprivileged user namespaces being disabled: CVE-2019-18198 CVE-2020-14386 CVE-2022-0185 CVE-2022-24122 CVE-2022-25636 CVE-2022-1966 resp. CVE-2022-32250&quot;
snvzzabout 2 years ago
There&#x27;s easily thousands of such bugs hidden in the kernel.<p>Reminder the kernel has over ten million LoCs, or megabytes of object code.<p>Perhaps we should start thinking about whether it is a good idea to run something this large in supervisor mode, with full privileges.<p>I wouldn&#x27;t say it is sensible in a world where seL4 exists.
评论 #35883127 未加载
评论 #35882591 未加载
评论 #35882793 未加载
评论 #35883512 未加载
评论 #35882781 未加载
评论 #35882472 未加载
评论 #35882530 未加载
knorkerabout 2 years ago
&gt; delete an existing nft rule that uses an nft anonymous set. And an example of the latter operation is an attempt to delete an element from that nft anonymous set after the set gets deleted<p>I&#x27;d be very interested to hear how this can be done by an unprivileged user.<p>Try to race set add&#x2F;removals, sure, but if it depends on the set itself getting deleted, that seems… harder.
评论 #35880848 未加载
AdamJacobMullerabout 2 years ago
<a href="https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln&#x2F;detail&#x2F;CVE-2023-32233" rel="nofollow">https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln&#x2F;detail&#x2F;CVE-2023-32233</a><p>The NIST CVE page points back here. Funny.<p>Nothing I see so far specifically says how far back this goes, but, <a href="https:&#x2F;&#x2F;security-tracker.debian.org&#x2F;tracker&#x2F;CVE-2023-32233" rel="nofollow">https:&#x2F;&#x2F;security-tracker.debian.org&#x2F;tracker&#x2F;CVE-2023-32233</a><p>Seems to go back really far.
moringabout 2 years ago
Honest question: Why did they build an exploit that uses the bug? I always assumed that use-after-free is equivalent to &quot;game over&quot; (i.e. I assumed that local privilege escalation is a given) and it is clear that such a bug must be fixed.<p>By that I mean, it might be easy or hard to exploit a bug to achieve LPE, but it seems to be redundant to prove that it is possible.
评论 #35884691 未加载
igo95862about 2 years ago
I am developing a sandbox project for Linux desktop applications called bubblejail:<p><a href="https:&#x2F;&#x2F;github.com&#x2F;igo95862&#x2F;bubblejail">https:&#x2F;&#x2F;github.com&#x2F;igo95862&#x2F;bubblejail</a><p>In the next not yet released version 0.8.0 there will be a new option to disable a specific namespace type per sandbox. For example, disabling the network namespace would prevent this exploit.<p>This is more flexible than globally disabling all user namespaces as some programs might use other more harmless namespaces like Steam uses mount namespaces to setup runtime libraries.
alex14frabout 2 years ago
Glad to have sticked with the good old iptables and left CONFIG_NF_TABLES unset in kernel configuration.
评论 #35880551 未加载
fnordpigletabout 2 years ago
Rust needs to be more prominent in the kernel, and where not rust ebpf. The days of hand mangling pointer arithmetic need to end.
评论 #35882241 未加载