back to article Patch ASAP: Tons of Linux apps can be hijacked by evil DNS servers, man-in-the-middle miscreants

A huge amount of Linux software can be hijacked by hackers from the other side of the internet, thanks to a serious vulnerability in the GNU C Library (glibc). Simply clicking on a link or connecting to a server can lead to remote code execution, allowing scumbags to steal passwords, spy on users, attempt to seize control of …

Page:

  1. Lord_Beavis
    Linux

    I'll bet...

    The Wintards will be all over this.

    Oh, wait all they know is point and click. Never mind...

    1. Anonymous Coward
      Anonymous Coward

      Re: I'll bet...

      You bet, because the arrogance and ignorance shown toward professional companies has been rather relentless. While MSFT and to a lesser extent Apple have woken up over the years and actually done something about their code etc, Lintards hid behind the 'we are better than anyone'. Well, guess what when you have amateurs hacking at code, this is what you get.Reality finally strikes for Linux arrogance that it is free of the risks faced by more popular sw. The BS wagon must finally have overflowed on the FOSS we get to inspect the code therefor it is better nonsense.

      The good news that might be jumped on by the Linux apologists is that the install base is finally large enough to be worth attacking. Since the mental shields are down, you all make a great target :-)

      1. Fibbles

        Re: I'll bet...

        Wait till anon finds out that Glib is also used on Windows and that Microsoft has funded Linux development.

        The need to define issues in black and white terms is surely the sign of a simple mind.

        1. Anon
          Mushroom

          Re: I'll bet...

          "Wait till anon finds out..."

          On a scale of nought to zero, guess how much I care :)

          1. Lord_Beavis
            Trollface

            Re: I'll bet...

            Is it -1?

        2. Tom 13

          Re: The need to define issues in black and white terms

          Yes, but I would say there's still a fair bit of crow for the free *nix crowd to eat on this one.

          - The bug has been out in the open for more than a year.

          - It seems they DID opt for obscurity while fixing it because it was too sensitive to do in public.

          While I regard the second item as prudent, it's pretty much been an article of faith for the Penguinistas that work needs to be done publicly and ALL vulnerabilities disclosed publicly as soon as known. Hell, they've even criticized Google for giving a 90 day grace period on vulnerabilities.

          All in all I still think the *nixes are more secure than the commercial offerings. But the Wintards aren't the only fanatics in the flame wars.

        3. Benchops

          Re: I'll bet...

          I agree with the sentiment of the post, but can't help wondering:

          "The need to define issues in black and white terms is surely the sign of a simple mind."

          ... is that meant to be ironic?

      2. kryptylomese

        Re: I'll bet...

        Even though it is obvious you are a troll and cannot read, but I will bite:-

        "While MSFT and to a lesser extent Apple have woken up over the years and actually done something about their code " - they are still shit what are you talking about?

        "you have amateurs hacking at code" - Google and Redhat are amateurs and BTW Microsoft have their own Linux distro too.

        "Reality finally strikes for Linux arrogance that it is free of the risks faced by more popular sw" - good lol - Linux is on more computers in the world than Windows or MAC, it just is not on as many desktop PC's.

        Microsoft have lots of bugs which they admit they will never fix and this issue is easily mitigated by a Linux administrator. Further, glibc will be patched to fix this, so yes FOSS wins again.

        1. Stuart Castle Silver badge

          Re: I'll bet...

          Even though it is obvious you are a troll and cannot read, but I will bite:-

          ""While MSFT and to a lesser extent Apple have woken up over the years and actually done something about their code " - they are still shit what are you talking about?"

          Which will be why a lot of hackers have turned their attention to apps, applications and plug ins such as Adobe Reader, Flash Player and Oracle's Java..

          ""Reality finally strikes for Linux arrogance that it is free of the risks faced by more popular sw" - good lol - Linux is on more computers in the world than Windows or MAC, it just is not on as many desktop PC's.

          Microsoft have lots of bugs which they admit they will never fix and this issue is easily mitigated by a Linux administrator. Further, glibc will be patched to fix this, so yes FOSS wins again."

          If Linux is on more computers than Windows or OSX, that makes this any Linux security hole potentially a FAR more serious concern than any Windows or OSX flaw. It's also like that a lot of those computers are in places where a Linux administrator is not available, thus there will be no one available to mitigate the flaw, or install patches.

          The fact is that the Linux advocates missed a security flaw for the best part of a decade while sitting there and criticising Microsoft, Apple and other big businesses for their security.

          Don't get me wrong. I am not a fan of a particular OS and will happily use whatever I need to do something (be it Linux, Windows, Unix or OSX), and I don't believe any OS is 100% secure.

          1. Lord_Beavis
            Trollface

            Re: I'll bet...

            "The fact is that the Linux advocates missed a security flaw for the best part of a decade while sitting there and criticising (sic) Microsoft, Apple and other big businesses for their security."

            Not to mention that most administrators have missed the the security flaw that Windows is for that last 2+ decades...

        2. RyokuMas
          Paris Hilton

          Re: I'll bet...

          "Even though it is obvious you are a troll..."

          The A/C, the original poster, or both?

          1. Lord_Beavis
            Trollface

            Re: I'll bet...

            I will take the badge with pride!

        3. Anonymous Coward
          Anonymous Coward

          Re: I'll bet...

          "this issue is easily mitigated by a Linux administrator"

          Only by breaking DNS. TCP replies over 1024 bytes are often required for DNSSEC.

        4. CheesyTheClown

          Re: I'll bet...

          I'll bite... I know I'm stupid for doing so, but I'll bite.

          Look at the description of the bug. This is something which should never be able to happen in a proper code review environment. So far as I know, there's no company or operating system which has large number of highly skilled developers actively watching their repositories for this kind of stupid.

          Linux, FreeBSD, Windows, Mac OS X all suffer differing levels of stupid. This particular flavor of stupid is actually as the troll suggest a special kind of linux stupid. Let me explain.

          While the Linux kernel developers and to some extent the glibc developers have embraced within some constraints the use of data structures, their means of embracing them has always been weird and highly inconvenient.

          See, where object oriented languages make implementing data structures a breeze and therefore can centralize major fixes of code to where the failure exists, structured languages like C tend to make use of some interesting creative tricks to accomplish the same. The gnome community for example implemented gobject which is the most obscenely inconvenient mechanism to reproduce the entire C++ language in C ever ... well next to Microsoft's COM. They go so far as to manually implement vtables which in a single inheritance environment doesn't cause much harm, but in multiple inheritance can be a disaster. On top of that, they implemented some of the weirdest RTTI methods I've ever seen.

          glibc doesn't use gobject. Instead it tends to borrow from the Linux kernel kind of stupid which makes weird use of over-inflated monster structures which are REALLY REALLY REALLY efficient, but their complexity is bonkers kind of stupid. I've seen so many poor uses of rbtree.h and rbtree.c that I shake in my boots whenever a header file includes rbtree.h. I also know that all it would take is one bad line of code in rbtree.c to completely destroy the entire linux kernel for security.... and it has barely any unit tests at all.

          Well... at least if the glibc guys would have used a linux style data structure, this wouldn't be a problem... but they didn't... instead they decided it was too much work to use one of the simulated classes. Instead, they reinvented the wheel... with 4 sides on it and made an array and chose to manage it themselves. This means all security holes or bugs found in the code would be localized. So, while this bug has been fixed in 5634543 different places in the kernel and glibc already, it was probably too much work to fix, so they just left it there. Funny thing is, I probably saw it a long time ago (1999) when I was writing a DNS resolver and peeking at glibc to see how it's done.

          Let's be honest though... all operating systems have these problems. Only Lintard and Wintards and so forth are stupid enough to think that it's unique to the other guy. If you actually were smarter than an amoebae, you'd realize that all code is insecure and Windows and Linux are both pretty decent for what they do but should never be trusted for security. That said, neither should any other code.

          I regularly teach how to hack through Checkpoint, Cisco, Palo Alto, etc... firewalls. I show that finding a nifty problem in a kernel driver or better yet in the syscall interface of the kernel can give you a golden ticket without the firewall software ever seeing the malicious code. I've got a few in my toolbox at the moment for Linux if I need them. Darwin is a goldmine of them. Windows is a little trickier since you have to actually dig a bit because it's closed. But, pretty much all operating systems are written like shit.

          If you want a personal opinion on which I think is cleanest at the moment, I actually have to give Microsoft the crown. Ever since the introduction of the Windows 8 kernel, it's been such a massive improvement that I like them best. They have some of the best coding practices at the moment and they seem to be taking process really serious. There was a few shortcoming in retaining legacy driver support in Windows 10 which bit them, but at this time, they're quite good. Mac is pretty close to the bottom. Apple releases more half-finished code than even GNU does these days. Their unit testing is pathetic and I expect there to be massive amounts of "Fixed it.. broke it again.,.. fixed it... broke it again" in the Darwin kernel.

          LLVM is maybe the most important project ever in the open source, but the quality of LLVM has been decreasing far too rapidly. The errors and warnings generated by the compiler are generally terrible for assisting with identifying root cause or even general error location. As such, the quality of the Mac kernel is only as high as it is because of duct tape and crazy glue... possibly some bubble gum as well.

          1. Anonymous Coward
            Anonymous Coward

            Re: I'll bet...

            tl;dr I'm brown nosing Microsoft.

        5. CheesyTheClown

          Re: I'll bet...

          Oh... ummm I forgot...

          RedHat generates absolutely massive amounts of "it kinda works, it must be done" code.

          Google does pretty well when they're focused. I'm actually often amazed at how much good code comes from them. That said, there's a good bit of slop as well. But would you seriously believe you can employ that many programmers and have nothing but good code?

          If RedHat were out of the game, there would be far less new bad code in Linux.... that said... there would be far fewer bug fixes as well. So I'm not sure if it would be a good or a bad thing.

          I'm hoping there will be a new small and simple OS which could make a run for being the new "Let's try it" platform.

      3. Donkey Molestor X

        Re: I'll bet...

        aww the poor Lintard babies had to downvote your post. a little bit too much reality for them. when the revolution comes you little Lintards will be the first against the wall. actually, a firing squad is too good for you. we'll just stick you in an elevator whose microcontroller has had its software written to exacting GLoonix Open Sores standards. (i.e.: code written by twisted sycophantic knob-polishers running around like headless chickens avoiding the retarded vituperation of that quadruple chinned Finnish bloatwagon named Loonis)

        1. hplasm
          WTF?

          Re: I'll bet...

          You can tell it's half-term at Donkey Molesting School...

      4. Uncle Timbo

        Re: I'll bet...

        Well - except someone DID inspect the code - Redhat and Google - and flagged a bug *before* it was exploited (as far as anyone knows).

        So, whilst there might be a notion that FOSS is perfect because Granny checks the apache source while Gentoo is installing, the fact that normal people rarely read source does not mean no-one reads the source.

        1. werdsmith Silver badge

          Re: I'll bet...

          Ridiculous polarisation.

          The simple truth is that software generally contains a lot of sloppy shit, regardless of where it comes from.

        2. Anonymous Coward
          Anonymous Coward

          Re: I'll bet...

          Sure, Google - hehe - bypassed its "90 days policy after which you're dead" in this case - it was afraid if it was made public a lot of its own infrastructure would have been at risk... as usual, different standards for you and your competitors, right?

          And how do you know nobody exploited this bug? It has been there sitting unseen for eight years.... and this is not the first time I see DNS resolving code failing for non "common", longer yet fully compliant answers (usually because there are more valid data than most DNS returns). I have a router that made many devices based on BusyBox fail because of its longer DNS answers.

      5. streaky

        Re: I'll bet...

        Lintards hid behind the 'we are better than anyone'. Well, guess what when you have amateurs hacking at code, this is what you get.Reality finally strikes for Linux arrogance that it is free of the risks faced by more popular sw. The BS wagon must finally have overflowed on the FOSS we get to inspect the code therefor it is better nonsense.

        Can't tell if srs but assuming you (AC suggests you might be) are you're not nearly as smart as you think you are for an extremely long list of reasons - not least you'll note it's Google who dug this one out. Just throwing that out there.

      6. Supa

        Re: I'll bet...

        You think you've made some kind of snarky point with your remark. All you've done is highlighted open source working as intended. The problem was identified and is being worked on. No code is perfect, and this highlights the importance of open source.

        Now can you tell me how many vulnerabilities are in your closed source OS I wonder, in a company that fired nearly all its Q&A? Oh yeah - you cant.

    2. gollux

      Re: I'll bet...

      All those eyes we've been quoted at us looking over the code have been blind since 2008?

      Sorry, another Linux/Android user... Not the purported Wintard.

      Who thinks OSS needs to get some better glasses. We need to be doing better than Cisco.

      1. Anonymous Coward
        Anonymous Coward

        Re: I'll bet...

        I am so not looking to recreating my image (virtual hd as well iso's) files. It doesn't matter which ecosystem gets hit since I do them all. And I'll be seeing trickle down from each upstream package.

        I could care less about comparing security track records, more eyes, less evangelists, please.

        1. Stevie

          Re: I'll bet...

          A computer is just a tool. This comment thread proves that some that use them are too.

        2. Glenturret Single Malt

          Re: I'll bet...

          If we use double negatives, "I could care less" becomes "I couldn't care more". Doesn't it?

          Or we read it as "I COULD care less (but I won't)"

    3. Archie Woodnuts

      Re: I'll bet...

      Obvious troll is obvious but I've resolved to post as even though my point and click equipment isn't in mint condition, I still enjoy making glibcomments.

      1. Hans 1
        Coffee/keyboard

        Re: I'll bet...

        >[...] I've resolved [...]

        watch your buffers, mate!

    4. Chika

      Re: I'll bet...

      The Wintards will be all over this.

      To which you only need remind them of the recent bug that left many Windows anti-virus packages with serious holes in them, amongst other things.

      I'll say it again. There is no such thing as a completely safe operating system. If you want to avoid being hacked, stay offline!

    5. Anonymous Coward
      Anonymous Coward

      Re: I'll bet...

      Remind me how public ability to review source code makes software more secure again?

  2. choleric

    Firewall updates applied. Local resolvers hardened. Awaiting patched glibc. (The days when I compiled my own are sadly long gone.)

    But where is the fancy logo?

  3. thames
    Linux

    Updated

    The updates for this on my desktop came through this morning, and I updated while reading El Reg and I've had no problems. There's no reason not to update now, so far as I can see.

    1. Adam 52 Silver badge

      Re: Updated

      You sure? Everything statically linked restarted with no downtime? This ain't VMS.

      1. Destroy All Monsters Silver badge

        Re: Updated

        This ain't VMS.

        VMS didn't do a Harry Potter either.

        1. Adam 52 Silver badge

          Re: Updated

          I get Stratus VOS and VMS confused, but I certainly did zero downtime patching on one or both of them. The OS let you replace a running executable and the runtime migrated all the threads as they terminated, you could even migrate threads between nodes on a cluster thereby enabling zero downtime firmware upgrades.

          1. Chris King
            Pint

            Re: Updated

            That's more likely VOS, but I'm no expert with Stratos kit.

            VMS still needed reboots for certain library updates (yes, I'm looking at you, C RTL - you were usually the worst offender), and if you had to AUTOGEN the system to update certain system parameters. Clusters might achieve uptime measured in years (if you could reboot individual nodes to apply updates) but standalone boxes, not so much.

            1. Anonymous Coward
              Anonymous Coward

              Re: VMS, Autogen

              Autogen mostly (maybe not entirely) went away when VMS systems with sensible amounts of memory arrived. Much of Autogen was about tuning the allocation of limited real physical resources in the most appropriate way for a given system's workload, in a way which widely used OSes don't bother with. When the system has multiple GB of memory, that's not always a big issue, and that now includes VMS too. Autogen's still there if you want it.

              VMS itself is still with us, the port to x86-64 is announced and timetabled, and VMS development and support is now being done by people with clue outside HP (with HP's agreement). Many of those people are well known from previous roles when VMS was a DEC product.

              http://www.vmssoftware.com/

              (no connection except as an observer)

      2. Anonymous Coward
        Anonymous Coward

        Re: Updated

        Static linking has been effectively dead on Linux for some time now. I don't think any Linux distros ship with statically linked binaries. You'd have to jump through a lot of hoops to build one these days if for some odd reason you wanted to.

        1. Adam 52 Silver badge

          @DougS

          Thanks for that. Is the kernel dynamically linked too (and if so, how does it bootstrap a file system)?

          As you can tell, I'm not particularly good on Linux details but I do know that 24/7 on a single box is hard.

          1. Anonymous Coward
            Anonymous Coward

            Re: @DougS

            The kernel has dynamically loadable modules, but obviously a kernel doesn't include libc!

        2. Anonymous Coward
          Anonymous Coward

          @doug

          "You'd have to jump through a lot of hoops to build one these days if for some odd reason you wanted to."

          What's so odd about it?

          For example, FreeBSD has known the /rescue folder for quite some time now; it's basically a folder which is packed with statically linked binaries (from bzip2 to mount, sed and tar and a whole lot more) and the reasoning behind it is quite simple: if for some reason your libraries become unavailable (for example because of the /usr filesystem crashing, some installation going wrong or even a human error in removing the wrong file(s)) then you can always fall back to these tools.

          I've never needed it myself so far, but I still think that there's nothing odd about the underlying philosophy.

          If interested then the rescue(8) manualpage has more information on this.

          1. Anonymous Coward
            Anonymous Coward

            Re: @doug

            Linux (at least the distros I use) have /lib and /lib64 linked to /usr/lib and /usr/lib64. Why in the world would you have a separate filesystem for /lib in 2016?

    2. adnim
      Linux

      sudo yum update

      three live systems, no reboot and I don't have to check every update description for fear of installing spyware.

      1. Anonymous Coward
        Anonymous Coward

        Re: sudo yum update

        "I don't have to check every update description for fear of installing spyware."

        I take it you are not running Android then?

    3. MyffyW Silver badge

      Re: Updated

      Read it, patched it, stopped worrying about it quicker than it normally takes me to compose a double-entendre-laden comment.

      ssh has it's benefits.

      1. I ain't Spartacus Gold badge
        Happy

        Re: Updated

        Read it, patched it, stopped worrying about it quicker than it normally takes me to compose a double-entendre-laden comment.

        So what you're saying is that you immediately jumped on it, whipped it out then it was all over in a few seconds?

        Did the earth move for you?

  4. Nate Amsden

    when was the bug created

    Kind of interested to know when the code that caused the bug was first released, how many years was it in glibc before being discovered?

    1. Anonymous Coward
      Anonymous Coward

      Re: when was the bug created

      No one will own up to that. So much for the 'lots of eyes on the code' BS. Since there is no payback on actually reviewing code, it doesn't get done. Commercial companies OTOH have a vested interest in improving their products, hence the focus from MS and Apple, and even a bit of Google on proactively finding holes and fixing them.

    2. Ole Juul

      Re: when was the bug created

      It seems there's some history starting in 2000 with a vuln which was apparently fixed in 2013 for version 2.18. I just checked a freshly updated Debian system and it is running a much old version. I guess there is some good reason to keep using the older versions if that's what Debian has been doing. Can someone here explain this?

Page:

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like