public inbox for gentoo-hardened@lists.gentoo.org
 help / color / mirror / Atom feed
* [gentoo-hardened] Security notice for hardened users.
@ 2010-10-22 11:21 Anthony G. Basile
  2010-10-22 12:39 ` Tom Hendrikx
  0 siblings, 1 reply; 4+ messages in thread
From: Anthony G. Basile @ 2010-10-22 11:21 UTC (permalink / raw
  To: gentoo-hardened

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 Hi all hardened users.

On Oct. 19, a local privilege escalation exploit was found [1,2] that
affected hardened kernels on all architectures.  For certain
configurations of the hardened kernel, it is possible for a local user
to obtain root privileges.  The current Proof-Of-Concept code can be
frustrated by not providing symbol information via /proc/kallsyms or
System.map,  but at this time it is unclear if other hardening
features such as CONFIG_PAX_MEMORY_UDEREF provide adequate protection
against variations of the POC which do not need symbols.

All users are encouraged to upgrade to hardened-sources-2.6.32-r22
which is currently marked stable on amd64 and x86.  It is being fast
tracked on other archs. [3]

hardened-sources-2.6.35-r4 is also not vulnerable, but cannot be
stabilized yet because of a bug in dhcp which also affects
gentoo-sources-2.6.35-r4. [4]   For those who want kernels > .32 and
can live with the minor bug, you can safely use
hardened-sources-2.6.35-r4.

Later this week, all ebuild for vulnerable kernels will be removed
from the tree, except for hardened-sources-2.6.34-r6
hardened-sources-2.6.32-r9 and hardened-sources-2.6.28-r9.  These will
be kept for continuity.


Ref:

[1] http://www.vsecurity.com/resources/advisory/20101019-1/

[2] http://bugs.gentoo.org/show_bug.cgi?id=341801

[3] http://bugs.gentoo.org/show_bug.cgi?id=341915

[4] http://bugs.gentoo.org/show_bug.cgi?id=334341

- -- 
Anthony G. Basile, Ph.D.
Gentoo Developer
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.16 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkzBc6QACgkQl5yvQNBFVTW5ZACfYee41wo/CB227ZWrt2X5x4sG
vxoAoKGpVvtXB48Sl/urvqqPenjpiq3x
=P+g7
-----END PGP SIGNATURE-----



^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [gentoo-hardened] Security notice for hardened users.
  2010-10-22 11:21 [gentoo-hardened] Security notice for hardened users Anthony G. Basile
@ 2010-10-22 12:39 ` Tom Hendrikx
  2010-10-22 12:46   ` Mike Pagano
  2010-10-22 16:14   ` Anthony G. Basile
  0 siblings, 2 replies; 4+ messages in thread
From: Tom Hendrikx @ 2010-10-22 12:39 UTC (permalink / raw
  To: gentoo-hardened

[-- Attachment #1: Type: text/plain, Size: 2048 bytes --]

On 22/10/10 13:21, Anthony G. Basile wrote:
>  Hi all hardened users.
> 
> On Oct. 19, a local privilege escalation exploit was found [1,2] that
> affected hardened kernels on all architectures.  For certain
> configurations of the hardened kernel, it is possible for a local user
> to obtain root privileges.  The current Proof-Of-Concept code can be
> frustrated by not providing symbol information via /proc/kallsyms or
> System.map,  but at this time it is unclear if other hardening
> features such as CONFIG_PAX_MEMORY_UDEREF provide adequate protection
> against variations of the POC which do not need symbols.
> 
> All users are encouraged to upgrade to hardened-sources-2.6.32-r22
> which is currently marked stable on amd64 and x86.  It is being fast
> tracked on other archs. [3]
> 
> hardened-sources-2.6.35-r4 is also not vulnerable, but cannot be
> stabilized yet because of a bug in dhcp which also affects
> gentoo-sources-2.6.35-r4. [4]   For those who want kernels > .32 and
> can live with the minor bug, you can safely use
> hardened-sources-2.6.35-r4.
> 
> Later this week, all ebuild for vulnerable kernels will be removed
> from the tree, except for hardened-sources-2.6.34-r6
> hardened-sources-2.6.32-r9 and hardened-sources-2.6.28-r9.  These will
> be kept for continuity.
> 
> 
> Ref:
> 
> [1] http://www.vsecurity.com/resources/advisory/20101019-1/
> 
> [2] http://bugs.gentoo.org/show_bug.cgi?id=341801
> 
> [3] http://bugs.gentoo.org/show_bug.cgi?id=341915
> 
> [4] http://bugs.gentoo.org/show_bug.cgi?id=334341
> 

Just to verify: if I understand
https://bugs.gentoo.org/show_bug.cgi?id=341801 correctly, a secure
replacement for (stable) hardened-sources-2.6.34-r6 on amd64 will not be
stabilized within a month, as it is awaiting baselayout-2 stabilisation
(offtopic: w00t). Or I'd need to downgrade to 2.6.32.

For people running baselayout-2 already, there is no reason not to add
hardened-sources-2.6.35-r4 to package.keywords and upgrade?

--
Regards,
	Tom


[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 262 bytes --]

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [gentoo-hardened] Security notice for hardened users.
  2010-10-22 12:39 ` Tom Hendrikx
@ 2010-10-22 12:46   ` Mike Pagano
  2010-10-22 16:14   ` Anthony G. Basile
  1 sibling, 0 replies; 4+ messages in thread
From: Mike Pagano @ 2010-10-22 12:46 UTC (permalink / raw
  To: gentoo-hardened

On Friday, October 22, 2010 08:39:41 am Tom Hendrikx wrote:
> On 22/10/10 13:21, Anthony G. Basile wrote:
> >  Hi all hardened users.
> > 
> > On Oct. 19, a local privilege escalation exploit was found [1,2] that
> > be kept for continuity.
> > 
> > 
> > 
> 
> Just to verify: if I understand
> https://bugs.gentoo.org/show_bug.cgi?id=341801 correctly, a secure
> replacement for (stable) hardened-sources-2.6.34-r6 on amd64 will not be
> stabilized within a month, as it is awaiting baselayout-2 stabilisation
> (offtopic: w00t). Or I'd need to downgrade to 2.6.32.
> 
> For people running baselayout-2 already, there is no reason not to add
> hardened-sources-2.6.35-r4 to package.keywords and upgrade?
> 
> --
> Regards,
> 	Tom
> 
> 

FYI
Baselayout-1 stablization will also enable 2.6.35 kernels to be stablized. That bug should be able to be filed on Nov 3rd.



^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [gentoo-hardened] Security notice for hardened users.
  2010-10-22 12:39 ` Tom Hendrikx
  2010-10-22 12:46   ` Mike Pagano
@ 2010-10-22 16:14   ` Anthony G. Basile
  1 sibling, 0 replies; 4+ messages in thread
From: Anthony G. Basile @ 2010-10-22 16:14 UTC (permalink / raw
  To: gentoo-hardened

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 10/22/2010 08:39 AM, Tom Hendrikx wrote:
> Just to verify: if I understand
> https://bugs.gentoo.org/show_bug.cgi?id=341801 correctly, a secure
> replacement for (stable) hardened-sources-2.6.34-r6 on amd64 will not be
> stabilized within a month, as it is awaiting baselayout-2 stabilisation
> (offtopic: w00t). Or I'd need to downgrade to 2.6.32.

That is correct.  When 2.6.35-r4 is stabilized it will be stabilized for
all archs.  2.6.34-r6 was *only* fast track stabilized on amd64 for
another local root exploit bug [1].

> 
> For people running baselayout-2 already, there is no reason not to add
> hardened-sources-2.6.35-r4 to package.keywords and upgrade?

Correct.  Even if you are not using baselayout-2 you can try
h-s-2.6.35-r4 and see if you get bit by the dhcp bug.  If you don't, I
see no reason not to just use it.

I didn't feel it was justifiable to fast track stabilization of two h-s
kernels.  Fast track stabilization is dangerous and in fact, 2.6.34-r6
is an example.  It has a bug that probably would have been caught if we
could have waiting the required 30 days [2].

PLEASE!  Report any bugs in h-s-2.6.32-r22 or h-s-2.6.35-r4 asap so we
can address them.  Ideally stabilized kernels should be bug free.


Ref.

[1] http://bugs.gentoo.org/show_bug.cgi?id=337645

[2] http://bugs.gentoo.org/show_bug.cgi?id=338572

- -- 
Anthony G. Basile, Ph. D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
(716) 829-8197
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.16 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkzBuFYACgkQl5yvQNBFVTVDxgCgkzdK646BGMu8S7gwZ8n1yNen
IuUAnRwuBTXqZqN80DRNCmkE+IMtiaZ3
=ht5V
-----END PGP SIGNATURE-----



^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2010-10-22 16:16 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2010-10-22 11:21 [gentoo-hardened] Security notice for hardened users Anthony G. Basile
2010-10-22 12:39 ` Tom Hendrikx
2010-10-22 12:46   ` Mike Pagano
2010-10-22 16:14   ` Anthony G. Basile

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox