oss-sec mailing list archives

Re: [Drbd-dev] [oss-security] CVE request: kernel: connector security bypass


From: Lars Ellenberg <lars.ellenberg () linbit com>
Date: Fri, 12 Mar 2010 10:34:52 +0100

On Thu, Mar 11, 2010 at 03:18:08PM -0700, dann frazier wrote:
On Mon, Nov 02, 2009 at 11:37:21AM +0000, Mark J Cox wrote:
On Mon, 2 Nov 2009, Eugene Teo wrote:

1/ uvesafb/connector: Disallow unprivileged users to send netlink packets
upstream commit: cc44578b5a508889beb8ae3ccd4d2bbdf17bc86c
introduced in v2.6.24-rc1; fixed in v2.6.32-rc3

2/ pohmelfs/connector: Disallow unprivileged users to configure pohmelfs
upstream commit: 98a5783af02f4c9b87b676d7bbda6258045cfc76
(staging/experimental)

3/ dst/connector: Disallow unprivileged users to configure dst
upstream commit: 5788c56891cfb310e419c4f9ae20427851797431
(staging/experimental)

4/ dm/connector: Only process connector packages from privileged processes
upstream commit: 24836479a126e02be691e073c2b6cad7e7ab836a
introduced in v2.6.31-rc1; fixed in v2.6.32-rc3

References:
http://secunia.com/advisories/37113/
http://xorl.wordpress.com/2009/10/31/linux-kernel-multiple-capabilities-missing-checks/

Debian provides an out-of-tree drbd module (drbd8), and it appears to
be affected by this issue as well. I assume we need to allocate an
additional CVE ID for it?

Maybe just go to current upstream drbd 8.3.7?

Here's a link to the upstream fix:
http://git.drbd.org/?p=drbd-8.3.git;a=commitdiff;h=71915b0d267392c77fe0ae2309535333026cef66

The in-tree version that got merged for 2.6.33 looks fine.

-- 
: Lars Ellenberg
: LINBIT | Your Way to High Availability
: DRBD/HA support and consulting http://www.linbit.com

DRBD® and LINBIT® are registered trademarks of LINBIT, Austria.


Current thread: