[Triumf-linux-managers] Torque/OpenPBS local root privilege escalation vulnerability (fwd)

Denice deatrich at triumf.ca
Wed Oct 25 10:58:43 PDT 2006


Renee asked me to forward this notice to the list; it concerns 
a vulnerability in torque/openpbs.

Other links concerning this vulnerability:
http://glite.web.cern.ch/glite/packages/R3.0/updates.asp
http://csirt.fe.up.pt/docs/TORQUE-audit.pdf

Apparently PBS-pro is also affected by this vulnerability; GridKa
shut down batch processing for the weekend, waiting for a patch
from the provider.

  cheers,
   denice


---------- Forwarded message ----------
Date: Fri, 20 Oct 2006 19:58:58 +0200
From: EGEE BROADCAST <egee-broadcast at cern.ch>
To: project-lcg-security-contacts at cern.ch
Subject: Torque/OpenPBS local root privilege escalation vulnerability


This email has been sent in copy mode
  From : Romain.Wartel at cern.ch
  Cc : project-lcg-security-contacts at cern.ch
------------------------------------------------------------------------------------
Publication from : Romain Wartel <Romain.Wartel at cern.ch> ()
This mail has been sent using the broadcasting tool available at http://cic.in2p3.fr
------------------------------------------------------------------------------------

Dear Site Admins and Security Contacts,

As announced earlier on today, Torque is currently affected by a security flaw.
A patch is now out and all affected sites are invited to upgrade immediately.

=============================================================================
Torque/OpenPBS local root privilege escalation vulnerability

Grid Software Vulnerability Group Security Advisory

-- Date: 2006-10-20

-- Background
Torque/OpenPBS is the batch job manager that implements the mechanism
    for job submission to the local computing nodes.

Pbs_mom is Torque/OpenPBS's component that manages the lifecycle of
    batch jobs on the Worker Nodes and provides the node status to the
    Torque/OpenPBS server part.

-- Affected Software
gLite <= 1.5, LCG <= 2.7.x, gLite <= 3.0.x.

-- Affected Components
All versions of OpenPBS and Torque are affected.

For gLite 3.x the affected meta-package are:

     glite-torque-client-config
     lcg-CE_torque
     glite-torque-server-config
     glite-CE

For LCG 2.x the affected meta-package is lcg-WN_torque.

For gLite 1.x the affected component is "Torque Client for the gLite
    Worker Nodes".

EGEE Grid software installs torque-1.0.1p6 by default, but it is known
    that sites tend to use newer versions of Torque or older versions of
    OpenPBS. Such setups are also vulnerable.

-- Vulnerability Details
By creating a malicious symbolic link, a local attacker could easily gain
    root privileges on any node running pbs_mom (typically Worker Node).

The Torque/OpenPBS's pbs_mom is writing the output and error messages
    from user jobs to predictable files using root privileges.

Unfortunately, Torque/OpenPBS is affected by a flaw that can enable
    a malicious user to symlink to any file on the system from these
    Torque/OpenPBS files, causing the output/error messages to be appended
    to arbitrary files. As a result, it is possible for the attacker to
    create, modify or execute arbitrary files on the system with root
    privileges.

-- Grid Security Vulnerability Group Response The Grid Security
    Vulnerability Group views this issue as EXTREMELY CRITICAL and strongly
    recommends that all sites using Torque/OpenPBS upgrade to the latest
    version of Torque/OpenPBS IMMEDIATELY, following the directions of the
    "Installation Notes" section.

-- Further documentation
This advisory is also available at the following URL:

http://www.gridpp.ac.uk/gsvg/

-- Installation Notes
The following rpms have been made available;

torque-1.0.1p6-13.SL30X.st.i386.rpm
torque-clients-1.0.1p6-13.SL30X.st.i386.rpm
torque-devel-1.0.1p6-13.SL30X.st.i386.rpm
torque-resmom-1.0.1p6-13.SL30X.st.i386.rpm
torque-server-1.0.1p6-13.SL30X.st.i386.rpm

These are appropriate to fix what is distributed with gLite 3.0 and LCG-2_7_0.

They are available in the appropriate repositories for each distribution.

http://glitesoft.cern.ch/EGEE/gLite/APT/R3.0/rhel30/RPMS.updates/
http://grid-deployment.web.cern.ch/grid-deployment/gis/apt/LCG-2_7_0/sl3/en/i386/RPMS.lcg_sl3.security/

We are distributing the full rpm set, but please note that the
    vulnerability is patched by upgrading the pbs_mom on the WNs. An
    upgrade of the head node is not strictly required.

After the upgrade, please ensure that pbs_mom has restarted properly
    (the rpm update should do this automatically).

-- Credit
This vulnerability was disclosed[1] in the BugTraq mailing list by Luis
    Miguel Silva (ISPGaya). The vulnerability was reported to the GSVG
    by Eygene Ryabinkin (RRC-KI).

-- Disclosure Timeline
2006-10-18 Vulnerability disclosed in the BugTraq list by Luis Miguel Silva (ISPGaya).
2006-10-20 Vulnerability reported to GSVG by Eygene Ryabinkin (RRC-KI)
2006-10-20 Initial response from the Grid Security Vulnerability Group
2006-10-20 OSCT notified of the vulnerability
2006-10-20 Initial patch provided by GSVG
2006-10-20 Updated sources available
2006-10-20 Updated LCG and gLite packages available
2006-10-20 Release preparation completed
2006-10-20 Public disclosure
2006-10-20 Site Admins and LCG Security Contacts notified

-- References
1. The original BugTraq thread:
http://www.securityfocus.com/archive/1/449248/30/0/threaded
=============================================================================

Regards,
Romain, on behalf of the Operational Security Coordination Team.


-- 
Romain Wartel                           Romain.Wartel at cern.ch
C.E.R.N.                                http://www.cern.ch/LCG
Information Technology Division         http://cern.ch/security
Bat.28-R-1-012
CH-1211 Geneva 23, Switzerland



More information about the Triumf-linux-managers mailing list