Gentoo Forums
Gentoo Forums
Gentoo Forums
Quick Search: in
KERNEL SECURITY BUG: NULL pointer dereference in proto_ops
View unanswered posts
View posts from last 24 hours

Goto page 1, 2  Next  
Reply to topic    Gentoo Forums Forum Index Kernel & Hardware
View previous topic :: View next topic  
Author Message
jonathanross
Tux's lil' helper
Tux's lil' helper


Joined: 19 Mar 2005
Posts: 77
Location: Planet Earth

PostPosted: Sat Aug 15, 2009 7:37 am    Post subject: KERNEL SECURITY BUG: NULL pointer dereference in proto_ops Reply with quote

Hello,

I see this is noted on the packages site for Gentoo Sources http://packages.gentoo.org/package/sys-kernel/gentoo-sources for the NULL pointer dereference due to incorrect proto_ops initializations bug but it's been there since yesterday.

Code:
*gentoo-sources-2.6.30-r5 (14 Aug 2009)
14 Aug 2009; Mike Pagano (mpagano)
+gentoo-sources-2.6.30-r5.ebuild:
Fix for (CVE-2009-2692), Kernel: NULL pointer dereference due to incorrect
proto_ops initializations. Fix for Linux Kernel clock_nanosleep() NULL
Pointer Dereference, SA36200. Security hid dereference before null check
fix. New patch for fbcondecor.


Does anyone have a known time for a release of the r5 sources or should I manually patch my boxes ?

One post said SPARC wasn't affected and others said they were. Any input ?

Thanks,

JR :)
Back to top
View user's profile Send private message
pappy_mcfae
Watchman
Watchman


Joined: 27 Dec 2007
Posts: 5999
Location: Pomona, California.

PostPosted: Sat Aug 15, 2009 7:51 am    Post subject: Reply with quote

It's in portage as of the time of this post.

Blessed be!
Pappy
_________________
This space left intentionally blank, except for these ASCII symbols.
Back to top
View user's profile Send private message
jonathanross
Tux's lil' helper
Tux's lil' helper


Joined: 19 Mar 2005
Posts: 77
Location: Planet Earth

PostPosted: Sat Aug 15, 2009 8:03 am    Post subject: Reply with quote

Hi Pappy !

Thanks for responding.

Which sync Server are you using ? I've tried rsync.us. rsync.namerica. rsync.europe. etc.

I still see:
Code:
sys-kernel/gentoo-sources-2.6.30-r4


Mucho thanks,

JR :?
Back to top
View user's profile Send private message
Akkara
Bodhisattva
Bodhisattva


Joined: 28 Mar 2006
Posts: 6702
Location: &akkara

PostPosted: Sat Aug 15, 2009 8:52 am    Post subject: Reply with quote

It is there. It is just marked ~. So you need to keyword it if you are running stable.
Back to top
View user's profile Send private message
jonathanross
Tux's lil' helper
Tux's lil' helper


Joined: 19 Mar 2005
Posts: 77
Location: Planet Earth

PostPosted: Sat Aug 15, 2009 8:55 am    Post subject: Reply with quote

Ahh, okay. Sorry for being a noob.

If it's unstable should I avoid it for production boxes ?

I thought it was just a small change to fix this bug so I'm not sure why it's marked unstable.

EDIT: Just found this doc: http://learn.clemsonlinux.org/wiki/Gentoo:Masked_ebuilds

Many thanks !

JR
Back to top
View user's profile Send private message
Akkara
Bodhisattva
Bodhisattva


Joined: 28 Mar 2006
Posts: 6702
Location: &akkara

PostPosted: Sat Aug 15, 2009 12:48 pm    Post subject: Reply with quote

I'm not sure why it is unstable. Maybe they want to test it a day or two just to be sure. Could be a small thing, such as making sure the patch has been copied over to the mirrors, trivial stuff that most likely is correct, but in the rare case that it isn't, doesn't cause screams of surprise. (Total guesses, there.)

Since this is a pretty important one, in case you (or someone else reading this thread) isn't aware, it is possible to keyword a specific instance of a package. So you can use that one without later on having it upgrade every time another unstable kernel is released:
tail -1 /etc/portage/package.keywords wrote:
=sys-kernel/gentoo-sources-2.6.30-r5
Back to top
View user's profile Send private message
jonathanross
Tux's lil' helper
Tux's lil' helper


Joined: 19 Mar 2005
Posts: 77
Location: Planet Earth

PostPosted: Sat Aug 15, 2009 2:29 pm    Post subject: Reply with quote

Thanks very much, Akkara !

You have been most helpful.

:D
Back to top
View user's profile Send private message
jak137
n00b
n00b


Joined: 23 Oct 2005
Posts: 18

PostPosted: Tue Aug 18, 2009 12:28 pm    Post subject: Reply with quote

What about 2.6.27 series? Do I have to upgrade to 2.6.30 or are there available (or are going to be) patched sources for earlier versions?
Back to top
View user's profile Send private message
cach0rr0
Bodhisattva
Bodhisattva


Joined: 13 Nov 2008
Posts: 4123
Location: Houston, Republic of Texas

PostPosted: Tue Aug 18, 2009 1:04 pm    Post subject: Reply with quote

jak137 wrote:
What about 2.6.27 series? Do I have to upgrade to 2.6.30 or are there available (or are going to be) patched sources for earlier versions?


As I understand it 2.6.27 isn't affected

Could be wrong there, and I'm sure someone else will chime in, but I've read somewhere that this doesn't affect versions other than 2.6.30-r1 thru -r4 OR a very early patched Red Hat kernel
_________________
Lost configuring your system?
dump lspci -n here | see Pappy's guide | Link Stash
Back to top
View user's profile Send private message
Bircoph
Retired Dev
Retired Dev


Joined: 27 Jun 2008
Posts: 261
Location: Moscow

PostPosted: Tue Aug 18, 2009 2:21 pm    Post subject: Reply with quote

cach0rr0 wrote:

As I understand it 2.6.27 isn't affected

All series till 2.6.30.4 inclusively are affected.
BTW, it is very easy to workaround this bug without kernel update: just disallow mmap to zero page:
Code:

echo 4096 > /proc/sys/vm/mmap_min_addr
echo "vm.mmap_min_addr = 4096" > /etc/sysctl.conf

_________________
Per aspera ad astra!
Back to top
View user's profile Send private message
jonathanross
Tux's lil' helper
Tux's lil' helper


Joined: 19 Mar 2005
Posts: 77
Location: Planet Earth

PostPosted: Tue Aug 18, 2009 2:26 pm    Post subject: Reply with quote

That could save the day but the release from the guys that discovered it said that it "may" be a workaround if I remember correctly.

:cry:
Back to top
View user's profile Send private message
monsm
Guru
Guru


Joined: 26 Sep 2007
Posts: 467
Location: London, UK

PostPosted: Tue Aug 18, 2009 2:39 pm    Post subject: Reply with quote

Good thing I saw this thread, was about to update the kernel. Thanks guys.

I was under the impression that this Null Pointer problem got discovered and fixed in the release candidate stage. Am I wrong or is this a second similar bug? I think I saw something elsewhere about it.

Mons
Back to top
View user's profile Send private message
jonathanross
Tux's lil' helper
Tux's lil' helper


Joined: 19 Mar 2005
Posts: 77
Location: Planet Earth

PostPosted: Tue Aug 18, 2009 2:40 pm    Post subject: Reply with quote

Here's as 'official' as I can find:

http://www.cr0.org/misc/CVE-2009-2692.txt

Quote:
-------------------
Mitigation
-----------------------

Recent kernels with mmap_min_addr support may prevent exploitation if
the sysctl vm.mmap_min_addr is set above zero. However, administrators
should be aware that LSM based mandatory access control systems, such
as SELinux, may alter this functionality.

It should also be noted that all kernels up to 2.6.30.2 are vulnerable to
published attacks against mmap_min_addr.

http://blog.cr0.org/2009/08/linux-null-pointer-dereference-due-to.html

JR :)
Back to top
View user's profile Send private message
cach0rr0
Bodhisattva
Bodhisattva


Joined: 13 Nov 2008
Posts: 4123
Location: Houston, Republic of Texas

PostPosted: Tue Aug 18, 2009 3:03 pm    Post subject: Reply with quote

ah yes, now i remember where I got that info

looking at the exploit code comments:

Code:

/* super fun 2.6.30+/RHEL5 2.6.18 local kernel exploit in /dev/net/tun
   A vulnerability which, when viewed at the source level, is unexploitable!
   But which, thanks to gcc optimizations, becomes exploitable :)
   Also, bypass of mmap_min_addr via SELinux vulnerability!
   (where having SELinux enabled actually increases your risk against a
    large class of kernel vulnerabilities)


Code:

The commit that introduced the vulnerability (Feb 6th):
    http://mirror.celinuxforum.org/gitstat/commit-detail.php?commit=33dccbb050bbe35b88ca8cf1228dcf3e4d4b3554
    Though it was committed before the release of the 2.6.29 kernel, it
    did not (thankfully) make it into the 2.6.29 kernel.  It first
    appeared in 2.6.30.

_________________
Lost configuring your system?
dump lspci -n here | see Pappy's guide | Link Stash
Back to top
View user's profile Send private message
mikegpitt
Advocate
Advocate


Joined: 22 May 2004
Posts: 3224

PostPosted: Tue Aug 18, 2009 3:33 pm    Post subject: Reply with quote

It looks like it is still marked ~arch as of 8/18. I'm sure it's just related to some extra testing. Although the vuln is critical, it is also local, so I am personally waiting until the devs mark it stable in case there is other breakage in -r5.
Back to top
View user's profile Send private message
cach0rr0
Bodhisattva
Bodhisattva


Joined: 13 Nov 2008
Posts: 4123
Location: Houston, Republic of Texas

PostPosted: Tue Aug 18, 2009 4:34 pm    Post subject: Reply with quote

local indeed, though the thought of a remote file inclusion vuln in another app allowing this to be run even as the apache user == your box is rooted, you're fairly screwed.

I guess not really an issue if the rest of your remotely-exposed applications/daemons are tightened down as they should be
_________________
Lost configuring your system?
dump lspci -n here | see Pappy's guide | Link Stash
Back to top
View user's profile Send private message
jonathanross
Tux's lil' helper
Tux's lil' helper


Joined: 19 Mar 2005
Posts: 77
Location: Planet Earth

PostPosted: Tue Aug 18, 2009 4:44 pm    Post subject: Reply with quote

I opted to go for the unstable kernel on a few production boxes in the end. With one left unpatched which needs a maintenance window.

Both SPARC64 and x86 boxes seem to be behaving well a few days in.

Although there's only a few daemons listening and everything is patched you never when that zero day bug might appear.

JR :)
Back to top
View user's profile Send private message
cach0rr0
Bodhisattva
Bodhisattva


Joined: 13 Nov 2008
Posts: 4123
Location: Houston, Republic of Texas

PostPosted: Tue Aug 18, 2009 4:57 pm    Post subject: Reply with quote

So the one item I'm not completely clear on - whether or not this affects hardened sources with the usual round of PaX (and well, grsec, but that's irrelevant here) options selected

I'm running 2.6.28-r9 with the 'hardened server' profile selected; but say I was on a branch that included the vulnerable code, would the hardened patches nullify the risk?
_________________
Lost configuring your system?
dump lspci -n here | see Pappy's guide | Link Stash
Back to top
View user's profile Send private message
jonathanross
Tux's lil' helper
Tux's lil' helper


Joined: 19 Mar 2005
Posts: 77
Location: Planet Earth

PostPosted: Tue Aug 18, 2009 5:01 pm    Post subject: Reply with quote

I'm not qualified to answer I'm afraid :(

Some of the chatter online has smirked at the extra kernel security actually being hit worse than standard builds and this is all I've seen 'officially' from my post above:

Quote:
However, administrators should be aware that LSM based mandatory access control systems, such
as SELinux, may alter this functionality.


JR :)
Back to top
View user's profile Send private message
mikegpitt
Advocate
Advocate


Joined: 22 May 2004
Posts: 3224

PostPosted: Tue Aug 18, 2009 5:35 pm    Post subject: Reply with quote

Actually in retrospect, I think I'm going to unmask -r5 and update today (since I have some time). I think it is very likely that the devs will be marking this one stable soon. If any issues to arise out of the version bump I think they would be reflected in a -r6 since -r5 is already in portage. Basically, if you unmask today and see that it goes stable in another day or two it shouldn't cause any negative issues.
Back to top
View user's profile Send private message
jonathanross
Tux's lil' helper
Tux's lil' helper


Joined: 19 Mar 2005
Posts: 77
Location: Planet Earth

PostPosted: Tue Aug 18, 2009 6:04 pm    Post subject: Reply with quote

That was my theory too.

That said, it was committed on Friday to Portage (which was a great response to the bug being announced) so it's already a few days but as I said we've still to see any instability issues on SPARC64 or x86 (formerly running 2.6.29 kernels).

I would hope it's just some testing that needs to be completed too. I can do the maintenance window box's upgrade once it's stable.

JR :)
Back to top
View user's profile Send private message
krinn
Watchman
Watchman


Joined: 02 May 2003
Posts: 7470

PostPosted: Tue Aug 18, 2009 6:39 pm    Post subject: Reply with quote

what a mess!

I prefer own a server with an unstable secure kernel, than a stable hackable one !

i could still reboot an unstable server for a min downtimes, what will we do if our root password is change, config... deleted.... BIG downtime !
Back to top
View user's profile Send private message
jonathanross
Tux's lil' helper
Tux's lil' helper


Joined: 19 Mar 2005
Posts: 77
Location: Planet Earth

PostPosted: Tue Aug 18, 2009 6:43 pm    Post subject: Reply with quote

I'm with you on that !!
Back to top
View user's profile Send private message
pappy_mcfae
Watchman
Watchman


Joined: 27 Dec 2007
Posts: 5999
Location: Pomona, California.

PostPosted: Tue Aug 18, 2009 6:56 pm    Post subject: Reply with quote

According to one of the above posted articles, this issue does have a fix, and has been summarily fixed in all versions (.27 and .30) released since that issue was discovered. So, once again, it seems it's time to do a bit of fixing. Since I run .29 on this machine, I guess that means me. hehehe

Blessed be!
Pappy
_________________
This space left intentionally blank, except for these ASCII symbols.
Back to top
View user's profile Send private message
krinn
Watchman
Watchman


Joined: 02 May 2003
Posts: 7470

PostPosted: Tue Aug 18, 2009 7:03 pm    Post subject: Reply with quote

but i read from the guy that found the hole that 32bits grsec+pax shoudn't be affect. (don't ask me why)
Quote:
Exploits the vulnerability in all Linux kernels since 2001. Exploit works on all kernels since 2001. Disables SELinux, AppArmor, LSM -- you know the drill.
Back to top
View user's profile Send private message
Display posts from previous:   
Reply to topic    Gentoo Forums Forum Index Kernel & Hardware All times are GMT
Goto page 1, 2  Next
Page 1 of 2

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum