[Triumf-linux-managers] Another year, another Linux privilege-escalation vulnerability

Kelvin Raywood kray at triumf.ca
Fri Jan 7 16:00:07 PST 2011


Quick summary

This latest vulnerability affects ScientificLinux-5 .  If you installed 
from a TRIUMF kickstart you don't need to do anything. You will be 
automatically protected after the overnight automatic-updates run this 
evening.

Background

In the last couple of years several Linux kernel-modules have been 
identified as being vulnerable to exploitation by a non-root user, 
resulting in the user gaining root privileges; ie. privilege escalation.
Scripts to exploit the vulnerabilties can be downloaded from the 
internet and require no special skills or knowledge to use.

Another vulnerable kernel-module has been identified in the kernel of 
RedHat Enterprise Linux-5.  Thus it afects the derviatives, 
ScientificLinux-5 and Centos-5.  See the attached message for details.

Unfortunately, there seems to be a trend to in these notices arriving on 
a Friday.  Apologies to all if this is an inconvenient time to receive 
this message.

The TRIUMF-rpm workaround

RedHat have released a patched kernel which has been rebuilt by 
ScientificLinux and is already on our mirror.  Presuming that you have 
not disabled auto-updates, this kernel will already be on your system 
and so a reboot will protect you from this latest identified vulnerability.

However, rebooting is not always convenient and you can still be 
protected by ensuring that a non-root user cannot cause the vulnerable 
kernel-module to be loaded.  In 2009 I created an rpm called

         triumf-disable-vul_kmod

and encouraged all managers of SL machines to install it.  The modules 
it disables are generally not useful on workstation PCs so there is no 
downside to installing it.  Nevertheless, the uptake has been 
underwhelming.  The TRIUMF kickstart installs an rpm called 
"triumf-nodeinfo" which contains a script that sends info about the 
system each day, to a TRIUMF server.  Among the info it sends is a 
complete list of installed packages.

The TRIUMF kickstart also installs a package called 
"triumf-workstation". It is a meta-package containing no files but 
depends on "triumf-printers" and "triumf-syslog".  I have updated 
triumf-workstation so that it also depends on triumf-disable-vul_kmod. 
Thus, the nightly update will get the latest version of 
triumf-workstation which will cause triumf-disable-vul_kmod to be installed.

So as I said in the quick summary, providing that you have not disabled 
auto-updates are remove triumf-workstation, your system will 
automatically be protected from the latest vulnerability after the 
regular overnight auto-update.

If you can't wait for the overnight update, do

         yum clean metadata
         yum update triumf-workstation

--
Kel Raywood
Core Computing and Networking

-------- Forwarded Message --------
Subject: [Site-Security-Contacts] High Risk Vulnerability CVE-2010-3859 
kernel: heap overflow in tipc_msg_build() [EGI-ADV-20110701]
Date: Fri, 7 Jan 2011 17:10:08 +0200

** WHITE information - Unlimited distribution allowed 
     **
** see https://wiki.egi.eu/wiki/EGI_CSIRT:TLP for distribution 
restrictions **

EGI CSIRT ADVISORY [EGI-ADV-20110701]

Title:       High Risk Vulnerability CVE-2010-3859 kernel: heap overflow 
in tipc_msg_build() [EGI-ADV-20110701]
Date:        January 07, 2011
Last update: January 07, 2011
URL:         https://wiki.egi.eu/wiki/EGI_CSIRT:Alerts/tipc-2011-01-07


Introduction
============

A problem in the TIPC module has been detected, with the
potential of giving any local user root privileges. This vulnerability
has been labelled CVE-2010-3859.

This vulnerability affects RHEL5 and its derivatives.

No public exploit for this issue is currently known, but the EGI CSIRT
considers this to be a high risk vulnerability.

Kernel update from Linux venders are available. Please note, the patched
kernel (kernel-2.6.18-194.32.1.el5) also addressed CVE-2010-3865 (RDS 
module vulnerability)

Details
=======

The tipc_msg_build() function in net/tipc/msg.c contains an exploitable 
kernel heap overflow that would allow a local user to escalate 
privileges to root by issuing maliciously crafted sendmsg() calls via 
TIPC sockets.

This issue did not affect the version of Linux kernel as shipped with 
Red Hat Enterprise Linux 3, 4, 6 and Red Hat Enterprise MRG as they did 
not include support for Transparent Inter-Process Communication Protocol 
(TIPC).

This flaw has been addressed by the following kernel version which EGI 
CSIRT  strongly recommends to be deployed: kernel-2.6.18-194.32.1.el5 
(or later)

After upgrading (and rebooting) to the new kernel, it is still 
recommended to blacklist the unused kernel module (tipc).

For sites that aren't able to update their kernel please check the
mitigation that follows in to blacklist the module.

Mitigation
==========

Most systems do not utilize TIPC and can simply block the vulnerability
by blacklisting the TIPC module (after unloading it if it is present),
for instance by running this script:

------------------

#!/bin/sh

# Unload the module

if lsmod | grep -q '^tipc '; then
   echo "TIPC was loaded"
fi
rmmod tipc 2>/dev/null
if lsmod | grep -q '^tipc '; then
   echo "FAILED to unload TIPC"
fi

# Blacklist the module
echo "blacklist tipc" >> /etc/modprobe.d/blacklist

------------------

This will take effect immediately and does NOT require a reboot. The
blacklisting will stay persistent across reboots.

Please note that if you indeed use the TIPC module the only solution is
to deploy a patched kernel.


Recommendations
===============

Linux vendors have released patched kernel. Please apply vendor kernel 
update as soon as possible.

Under exceptional circumstance, if you can not update the kernel, please 
immediately apply
the mitigation described above to all user-accessible systems.


It is recommended to keep this module blacklisted if not needed at your 
site, even after
updating the kernel.


References
==========
https://bugzilla.redhat.com/show_bug.cgi?id=645867
https://www.redhat.com/security/data/cve/CVE-2010-3859.html
https://rhn.redhat.com/errata/RHSA-2011-0004.html

http://listserv.fnal.gov/scripts/wa.exe?A2=ind1101&L=scientific-linux-errata&T=0&P=78

http://www.openwall.com/lists/oss-security/2010/10/22/2
http://marc.info/?l=linux-netdev&m=128770476511716&w=2



More information about the Triumf-linux-managers mailing list