|
Message-ID: <CA+rthh-T+mTJZTz-LnoD_ZZfDUD6aprDFstSbSiXVmRTc8PDFg@mail.gmail.com> Date: Sat, 24 Jan 2015 18:43:13 +0100 From: Mathias Krause <minipli@...glemail.com> To: oss-security@...ts.openwall.com Cc: marc.deslauriers@...onical.com, cve-assign@...re.org Subject: Re: Re: CVE Request: Linux kernel crypto api unprivileged arbitrary module load On 24 January 2015 at 15:53, <cve-assign@...re.org> wrote: >> The Crypto API in the Linux kernel before 3.19 allowed unprivileged users to >> load arbitrary kernel modules. > >> https://plus.google.com/+MathiasKrause/posts/PqFCo4bfrWu > >> https://lkml.org/lkml/2013/3/4/70 >> https://git.kernel.org/linus/5d26a105b5a73e5635eae0629b42fa0a90e07b7b > > Use CVE-2013-7421 for the original 2013 discovery by Mathias Krause, > with a "Try the code snippet below on a system with > CONFIG_CRYPTO_USER_API=y" attack. > [...] >> https://git.kernel.org/linus/4943ba16bbc2db05115707b3ff7b4874e9e3c560 > > Use CVE-2014-9644 for this second discovery in 2014, mentioned in > PqFCo4bfrWu as 'stumbled over the first flaw -- not handling crypto > templates correctly. This means, the patch would prevent loading the > vfat.ko module when requesting a cipher named "vfat" but would fail to > do so if one would request "vfat(aes)" instead.' As far as we can > tell, this is a discovery of a separate attack vector that wasn't > implied by the 2013 post. Even though this was a new discovery, not explicitly mentioned in the initial report, it's the same bug, essentially -- using the AF_ALG interface to load arbitrary modules. In fact, commits 5d26a105b5a7 and 4943ba16bbc2 should have been a single one in the first place. But for whatever reasons commit 5d26a105b5a7 was applied, so the template issue had to be fixed in the follow-up commit 4943ba16bbc2. However, both commits were merged together into Linus' tree that ended up in v3.19-rc1. See the merge commit at [1] and the discussion at [2] for further reference. [1] https://git.kernel.org/linus/e3aa91a7cb21 [2] http://www.mail-archive.com/linux-crypto@vger.kernel.org/msg12369.html So I think CVE-2014-9644 should be marked as a duplicate of CVE-2013-7421. It's the same issue, really. >> https://git.kernel.org/linus/3e14dcf7cb80b34a1f38b55bc96f02d23fdaaaaf > > This isn't within the scope of either CVE-2013-7421 or CVE-2014-9644. > As far as we can tell, it is largely a usability fix. The example > mentioned is "This fixes, e.g., requesting 'ecb(blowfish-generic)', > which used to work with kernels v3.18 and below." Is there also a > security impact if 3e14dcf7cb80b34a1f38b55bc96f02d23fdaaaaf is > missing? For example, is it likely that code exists that requests > ecb(blowfish-generic) in an environment without > 3e14dcf7cb80b34a1f38b55bc96f02d23fdaaaaf, and is able to continue > working afterward, but falls back to weak encryption? It's just an API compliance fix to not regress the user interface for the Crypt User API. No security fix, AFAICS. Regards, Mathias
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.