How attackers break into out-of-date kernels

Kernel Trouble

Article from Issue 285/2024
Author(s):

This deep look at how intruders attack an out-of-date kernel should be enough to convince you of the need to stay vigilant.

The multitudinous varieties of attacks that can affect OSs are hard to keep up with, but recently I wanted to test some Linux kernel exploits to keep up with my interest in ethical hacking. Such attacks often occur once access has been gained to a system. They are sometimes used in order to achieve privilege escalation – in other words, to boost a non-root user's privileges to the level of the root user in order to gain full control of the system.

It is easy to become content with the kernel you are running and forget to install all the updates and upgrade the system when the kernel is no longer supported. Many users install long-term support (LTS) Linux systems and get so used to them after five years that they aren't in a hurry to upgrade when the service cycle ends.

This article will introduce you to some techniques intruders use to attack old kernels, and, in case you ever had any doubts, it should convince you to never fall behind on those kernel patches and updates.

[...]

Use Express-Checkout link below to read the full article (PDF).

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • In-Depth Security

    More than just a boot manager, GRUB 2 can help you add another line of protection to your security defenses.

  • Brad Spengler Exposes Exploit in Linux Kernel 2.6.31

    The developer behind the grsecurity.net security portal, Brad Spengler, has released videos on the Web that demonstrate a security hole in the current Linux kernel.

  • Kernel Tips

    Worried about a recent security exploit? Want to take advantage of a new hardware feature? You don’t need to be a Linux expert to patch and compile the Linux kernel. We'll show you how to get started.

  • Update: Security Hole in Kernel Allows Privilege Extensions

    A null-pointer dereference in the Linux kernel allows local users to assume root privileges. Brad Spengler, who claims first discovery, announced that he will present a corresponding exploit during the course of the day.

  • Optimizing the Kernel

    We explore some optimizations designed to deliver a smoother experience for desktop users.

comments powered by Disqus
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News