PDA

View Full Version : Another new kernel flaw that Google won't fix - android and linux issue(s)



Bob
20th January 2016, 23:07
"I can't take it anymore for one simple, but really fundamental, reason."

Last summer at the outbreak of Stagefright (a flaw that enabled attackers to compromise Android devices by simply sending a text message), Android enthusiast Lorenzo Franceschi-Bicchierai wrote "In many ways, Android is great. I love its open source ethos and the ability one has to customize it. But I can't take it anymore for one simple, but really fundamental, reason.

"Google still has very little control over software updates, and Android users are basically at the mercy of their carriers and phone manufacturers when it comes to getting updates or new operating system versions."

(Source (http://appleinsider.com/articles/16/01/20/another-new-kernel-flaw-that-google-wont-fix-for-android-users-prompts-more-switching-to-apples-ios))

Now what?

A new Zero-Day flaw discovered by Perception Point Research has existed since 2012, long enough to have to spread vulnerability across "tens of millions of Linux PCs and servers, and 66 percent of all Android devices."

As noted in a report by Dan Goodin of Ars, the flaw allows unprivileged apps to "gain nearly unfettered root access," including access to camera, microphone, GPS location and personal data.

And security researcher Nicholas Weaver is giving us an easy example to put this issue in perspective: "Imagine if Windows patches had to pass through Dell and your ISP before they came to you?

And neither cared? That is called Android."

In November, Chris Soghioan, the principal technologist for the American Civil Liberties Union, described Google's lack of updates—combined with its lack of user privacy and data collection—as a "digital security divide," adding that "the security people I know at Google are embarrassed by Android."

(sigh)

One is tempted to ask, exactly who is running Google's development program, the apparently either knowingly flawed OS produced and turned on the public "freely to install and use" (according to some certain terms in the license...) or accidentally missed during the debug phase issues that come up. One is tempted to say all software development programs suffer from bugs not being discovered early during the alpha and beta shakeouts.. Or is there something else going on? Just think of it, if one were actively involved as a spook or associated with one - having access to a spying/reporting device that anyone who has been lead to obtain such a "smart-phone", how much of a service Google is actually providing? Can we ask, "At what cost did the owner(s) "sell out" for again?" It would be interesting to see some whistleblowers appear explaining through example and tracking back to the periods chronologically of inception to deception..


http://photos2.appleinsidercdn.com/gallery/15577-11967-Screen-Shot-2016-01-14-at-72730-PM-l.jpg

Android's problem caused by the fragmented accountability of carriers, hardware makers and Google itself to create, test and distribute updates for their customers after the initial sale.

Putting that in perspective, at best 1 1/2 years of updates from a newly purchased smartphone running the newest operating system software... And all the older smartphones do not ever get fixed. WHO updates every 1 1/2 years? Usually those contracts go for 2 years, and what happens during that last 6 months? The ride is over? Unless one buys a new phone a new plan... Interesting that some carriers have been saying, they'll do away with the 2 year mandatory contract and INSIST that the phone user BUY their phone - (some costs upwards in the 600$ range)..

Having been discovered, the flaw is relatively easy to fix for most desktop and server users, but requires a kernel patch on Android that most users of phones, tablets and other devices are unlikely to ever get.

Despite releasing a new version of Android last fall alongside iOS 9, Google still only reports that a tiny fraction of its installed base has gained access to it..


A new kernel privilege escalation flaw discovered in the Linux kernel requires server operators to install a patch, but is not going to be fixed for the majority of Android users.

http://cc.amazingcounters.com/counter.php?i=3190880&c=9572953

chancy
20th January 2016, 23:31
Hello Everyone:
Now it's official. Wherever there are cell towers you are able to be tracked, bugged and hacked. Not in that order but you see the problem.
Everything you were told about cell phones isn't true. Anyone with the right equipment for a couple of hundred bucks can keep tabs on anyone with a cell phone on the planet.
Here's a clip from 60 minutes Australia.
Enjoy
chancy

Link: https://vimeo.com/136429366

60 Minutes AU - Bugged -Tracked - Hacked - 20150816

Bob
21st January 2016, 00:26
What went 'wrong'

“The fix was simple,” Pats said. “The problem is not all devices Linux get patched automatically.” (users on other OS's also frequently turn OFF auto-updates...)

The vulnerability, [B]CVE-2016-0728 (http://perception-point.io/2016/01/14/analysis-and-exploitation-of-a-linux-kernel-vulnerability-cve-2016-0728/), lives in the keyring facility built into the various flavors of Linux. The keyring encrypts and stores login information, encryption keys and certificates, and makes them available to applications. In a report published by Perception Point, researchers said the vulnerability is a reference leak that can be abused to ultimately execute code in the Linux kernel.

“User space applications give [keyring] the option to manage the crypto keys,” Pats said. “The user doesn’t have to manage keys; the OS does it for the application. Apps use it for security reasons.

When they want to apps to work with crypto, they use this feature. The feature has kernel access; the OS gives the userland app the ability to use this feature. The problem is that the code runs in the kernel.”

Pats said that SMEP (Supervisor Mode Execution Protection) and SMAP (Supervicor Mode Access Protection) make exploitation difficult on Linux servers, while SELinux does the same for Android devices. SMEP and SMAP are relatively new features that prevent the kernel from accessing and executing code from userland.

The flaw may linger a little longer on Android devices, since most updates are not pushed automatically by carriers and manufacturers. Android is built upon the Linux kernel, but customized without many of the libraries that accompany standard Linux builds.

Perception Point published a technical analysis of the vulnerability and how to exploit it, including proof-of-concept code published to its Github page.

(Source (https://threatpost.com/serious-linux-kernel-vulnerability-patched/115923/))

Bob
21st January 2016, 00:35
So is Android based on Linux? And what does that say about Linux Kernels?

Android is a mobile operating system (OS) currently developed by Google, based on the Linux kernel and designed primarily for touchscreen mobile devices such as smartphones and tablets.

Android's user interface is mainly based on direct manipulation, using touch gestures that loosely correspond to real-world actions, such as swiping, tapping and pinching, to manipulate on-screen objects, along with a virtual keyboard for text input.

In addition to touchscreen devices, Google has further developed Android TV for televisions, Android Auto for cars, and Android Wear for wrist watches, each with a specialized user interface.

Variants of Android are also used on notebooks, game consoles, digital cameras, and other electronics. As of 2015, Android has the largest installed base of all operating systems.

Put that in perspective exactly WHERE this Operating system has been installed with the FREE incentive to have it applied (according to specific license terms)..

Initially developed by Android, Inc., which Google bought in 2005, Android was unveiled in 2007, along with the founding of the Open Handset Alliance – a consortium of hardware, software, and telecommunication companies devoted to advancing open standards for mobile devices.

As of July 2013, the Google Play store has had over one million Android applications ("apps") published, and over 50 billion applications downloaded.

An April–May 2013 survey of mobile application developers found that 71% of developers create applications for Android, and a 2015 survey found that 40% of full-time professional developers see Android as their priority target platform, which is comparable to Apple's iOS on 37% with both platforms far above others.

At Google I/O 2014, the company revealed that there were over one billion active monthly Android users, up from 538 million in June 2013.

Android's source code is released by Google under open source licenses, although most Android devices ultimately ship with a combination of open source and proprietary software, including proprietary software required for accessing Google services.

Android is popular with technology companies that require a ready-made, low-cost and customizable operating system for high-tech devices.

Its open nature has encouraged a large community of developers and enthusiasts to use the open-source code as a foundation for community-driven projects, which add new features for advanced users or bring Android to devices originally shipped with other operating systems.

At the same time, as Android has no centralised update system most Android devices fail to receive security updates: research in 2015 concluded that almost 90% of Android phones in use had known but unpatched security vulnerabilities due to lack of updates and support.

The success of Android has made it a target for patent litigation as part of the so-called "smartphone wars" between technology companies.

(Source (https://en.wikipedia.org/wiki/Android_(operating_system)))


http://ecx.images-amazon.com/images/I/51Uk-pi0SGL._SY300_.jpg


http://photos2.appleinsidercdn.com/gallery/12399-6232-9137-595-140501-Android-l-l.jpg

Bob
21st January 2016, 01:15
So who's the team who discovered this nasty hole?

Perception Point (http://perception-point.io/#home)

An Israeli team of intelligence experts :)

SHLOMI LEVIN - CTO

Shlomi is a cyber security enthusiast with a vast knowledge ranging from Reverse Engineering and Exploit Development to Network security and OS internals. He led a top R&D team in Israel’s elite intelligence corps. Implemented cyber security products in IBM (formerly Trusteer) and Palo-Alto Networks (formerly Cyvera). With more than a decade of experience in the industry Shlomi shapes the technological vision of Perception Point.

YEVGENY PATS - CEO

Yevgeny is involved in the cyber security industry for over a decade. He designed and led multi-million dollar projects at an innovative team in Israel’s elite intelligence corps. Prior to Perception Point he took part in a cyber offense governmental projects at NSO. He was also in the R&D team of Hyperwise and integrated their solution into CheckPoint’s product. Yevgeny is leading Perception Point with strong executive and strategy skills.

MICHAEL AMINOV - VP R & D

Michael was an officer and team leader in Israel’s elite intelligence corps. Prior to Perception Point, Michael led the R&D in CyActive and integrated their solution in PayPal’s network. With wide experience in cyber security, product management and deployment strategies he is leading Perception Point’s R&D team.

references

https://en.wikipedia.org/wiki/Military_Intelligence_Directorate_(Israel) - Military Intelligence Directorate - Israel
https://en.wikipedia.org/wiki/Unit_8200 - Unit 8200
http://wikileaks-press.info/in-depth-report-israeli-intelligence/ - WikiLeaks Press

lucidity
21st January 2016, 03:03
The positive side of this tom foolery, is that some crypto-liberatarian techies will
devise their own version of android with anonymity and security features built in.
Encrypted email, encrypted texts, encrypted video-messaging, a tor-browser,
and an anonymous bittorrent client.

There's an opportunity here for startups to meet this need.

Lifebringer
21st January 2016, 06:06
A lot of people got google, I never use it an if I do take the address history delete but that's still not enough. Israel spies on us, Amerikkka spies on us, everyone wants to know how much we know and how close we are to closing in on the whole truth.Something special must be about to happen to us, or for us, and they want to know the minute we know. I believe they are having a hard time feeding off us, and more and more are not as tasty in fear or emotional as they wake up. Will the awakening simply starve them all of the emotions they feed off?
Neocons and zionist, go figure. Spy vs spy. LOL MAD INC.:shielddeflect: