Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-21499: git/torvalds/linux.git - Linux kernel source tree

KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown. An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is triggered. CVSS 3.1 Base Score 6.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H).

CVE
#mac#linux#git#oracle#chrome

KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown. An attacker with access to a serial port (for example, via a hypervisor console, which some cloud vendors provide over the network) could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is triggered. Fix this by integrating lockdown into kdb’s existing permissions mechanism. Unfortunately kgdb does not have any permissions mechanism (although it certainly could be added later) so, for now, kgdb is simply and brutally disabled by immediately exiting the gdb stub without taking any action. For lockdowns established early in the boot (e.g. the normal case) then this should be fine but on systems where kgdb has set breakpoints before the lockdown is enacted than “bad things” will happen. CVE: CVE-2022-21499 Co-developed-by: Stephen Brennan [email protected] Signed-off-by: Stephen Brennan [email protected] Reviewed-by: Douglas Anderson [email protected] Signed-off-by: Daniel Thompson [email protected] Signed-off-by: Linus Torvalds [email protected]

@@ -121,10 +121,12 @@ enum lockdown_reason {

LOCKDOWN_DEBUGFS,

LOCKDOWN_XMON_WR,

LOCKDOWN_BPF_WRITE_USER,

+ LOCKDOWN_DBG_WRITE_KERNEL,

LOCKDOWN_INTEGRITY_MAX,

LOCKDOWN_KCORE,

LOCKDOWN_KPROBES,

LOCKDOWN_BPF_READ_KERNEL,

+ LOCKDOWN_DBG_READ_KERNEL,

LOCKDOWN_PERF,

LOCKDOWN_TRACEFS,

LOCKDOWN_XMON_RW,

@@ -53,6 +53,7 @@

#include <linux/vmacache.h>

#include <linux/rcupdate.h>

#include <linux/irq.h>

+#include <linux/security.h>

#include <asm/cacheflush.h>

#include <asm/byteorder.h>

@@ -752,6 +753,29 @@ cpu_master_loop:

continue;

kgdb_connected = 0;

} else {

+ /*

+ * This is a brutal way to interfere with the debugger

+ * and prevent gdb being used to poke at kernel memory.

+ * This could cause trouble if lockdown is applied when

+ * there is already an active gdb session. For now the

+ * answer is simply "don’t do that". Typically lockdown

+ * *will* be applied before the debug core gets started

+ * so only developers using kgdb for fairly advanced

+ * early kernel debug can be biten by this. Hopefully

+ * they are sophisticated enough to take care of

+ * themselves, especially with help from the lockdown

+ * message printed on the console!

+ */

+ if (security_locked_down(LOCKDOWN_DBG_WRITE_KERNEL)) {

+ if (IS_ENABLED(CONFIG_KGDB_KDB)) {

+ /* Switch back to kdb if possible… */

+ dbg_kdb_mode = 1;

+ continue;

+ } else {

+ /* … otherwise just bail */

+ break;

+ }

+ }

error = gdb_serial_stub(ks);

}

@@ -45,6 +45,7 @@

#include <linux/proc_fs.h>

#include <linux/uaccess.h>

#include <linux/slab.h>

+#include <linux/security.h>

#include “kdb_private.h”

#undef MODULE_PARAM_PREFIX

@@ -166,10 +167,62 @@ struct task_struct *kdb_curr_task(int cpu)

}

/*

- * Check whether the flags of the current command and the permissions

- * of the kdb console has allow a command to be run.

+ * Update the permissions flags (kdb_cmd_enabled) to match the

+ * current lockdown state.

+ *

+ * Within this function the calls to security_locked_down() are "lazy". We

+ * avoid calling them if the current value of kdb_cmd_enabled already excludes

+ * flags that might be subject to lockdown. Additionally we deliberately check

+ * the lockdown flags independently (even though read lockdown implies write

+ * lockdown) since that results in both simpler code and clearer messages to

+ * the user on first-time debugger entry.

+ *

+ * The permission masks during a read+write lockdown permits the following

+ * flags: INSPECT, SIGNAL, REBOOT (and ALWAYS_SAFE).

+ *

+ * The INSPECT commands are not blocked during lockdown because they are

+ * not arbitrary memory reads. INSPECT covers the backtrace family (sometimes

+ * forcing them to have no arguments) and lsmod. These commands do expose

+ * some kernel state but do not allow the developer seated at the console to

+ * choose what state is reported. SIGNAL and REBOOT should not be controversial,

+ * given these are allowed for root during lockdown already.

+ */

+static void kdb_check_for_lockdown(void)

+{

+ const int write_flags = KDB_ENABLE_MEM_WRITE |

+ KDB_ENABLE_REG_WRITE |

+ KDB_ENABLE_FLOW_CTRL;

+ const int read_flags = KDB_ENABLE_MEM_READ |

+ KDB_ENABLE_REG_READ;

+ bool need_to_lockdown_write = false;

+ bool need_to_lockdown_read = false;

+ if (kdb_cmd_enabled & (KDB_ENABLE_ALL | write_flags))

+ need_to_lockdown_write =

+ security_locked_down(LOCKDOWN_DBG_WRITE_KERNEL);

+ if (kdb_cmd_enabled & (KDB_ENABLE_ALL | read_flags))

+ need_to_lockdown_read =

+ security_locked_down(LOCKDOWN_DBG_READ_KERNEL);

+ /* De-compose KDB_ENABLE_ALL if required */

+ if (need_to_lockdown_write || need_to_lockdown_read)

+ if (kdb_cmd_enabled & KDB_ENABLE_ALL)

+ kdb_cmd_enabled = KDB_ENABLE_MASK & ~KDB_ENABLE_ALL;

+ if (need_to_lockdown_write)

+ kdb_cmd_enabled &= ~write_flags;

+ if (need_to_lockdown_read)

+ kdb_cmd_enabled &= ~read_flags;

+}

+/*

+ * Check whether the flags of the current command, the permissions of the kdb

+ * console and the lockdown state allow a command to be run.

*/

-static inline bool kdb_check_flags(kdb_cmdflags_t flags, int permissions,

+static bool kdb_check_flags(kdb_cmdflags_t flags, int permissions,

bool no_args)

{

/* permissions comes from userspace so needs massaging slightly */

@@ -1180,6 +1233,9 @@ static int kdb_local(kdb_reason_t reason, int error, struct pt_regs *regs,

kdb_curr_task(raw_smp_processor_id());

KDB_DEBUG_STATE("kdb_local 1", reason);

+ kdb_check_for_lockdown();

kdb_go_count = 0;

if (reason == KDB_REASON_DEBUG) {

/* special case below */

@@ -59,10 +59,12 @@ const char *const lockdown_reasons[LOCKDOWN_CONFIDENTIALITY_MAX+1] = {

[LOCKDOWN_DEBUGFS] = "debugfs access",

[LOCKDOWN_XMON_WR] = "xmon write access",

[LOCKDOWN_BPF_WRITE_USER] = "use of bpf to write user RAM",

+ [LOCKDOWN_DBG_WRITE_KERNEL] = "use of kgdb/kdb to write kernel RAM",

[LOCKDOWN_INTEGRITY_MAX] = "integrity",

[LOCKDOWN_KCORE] = "/proc/kcore access",

[LOCKDOWN_KPROBES] = "use of kprobes",

[LOCKDOWN_BPF_READ_KERNEL] = "use of bpf to read kernel RAM",

+ [LOCKDOWN_DBG_READ_KERNEL] = "use of kgdb/kdb to read kernel RAM",

[LOCKDOWN_PERF] = "unsafe use of perf",

[LOCKDOWN_TRACEFS] = "use of tracefs",

[LOCKDOWN_XMON_RW] = "xmon read and write access",

Related news

Red Hat Security Advisory 2024-0724-03

Red Hat Security Advisory 2024-0724-03 - An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Issues addressed include buffer overflow, bypass, denial of service, double free, memory leak, null pointer, privilege escalation, and use-after-free vulnerabilities.

CVE-2023-21850: Oracle Critical Patch Update Advisory - January 2023

Vulnerability in the Oracle Demantra Demand Management product of Oracle Supply Chain (component: E-Business Collections). Supported versions that are affected are 12.1 and 12.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Demantra Demand Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Demantra Demand Management accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).

RHSA-2022:9040: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6.3 security update

Red Hat Advanced Cluster Management for Kubernetes 2.6.3 General Availability release images, which provide security updates, fix bugs, and update container images. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3517: nodejs-minimatch: ReDoS via the braceExpand function * CVE-2022-41912: crewjam/saml: Authentication bypass when processing SAML responses containing multiple Assertion elements

Red Hat Security Advisory 2022-8889-01

Red Hat Security Advisory 2022-8889-01 - This is an Openshift Logging bug fix release. Issues addressed include a denial of service vulnerability.

RHSA-2022:8781: Red Hat Security Advisory: Logging Subsystem 5.5.5 - Red Hat OpenShift security update

Logging Subsystem 5.5.5 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36518: jackson-databind: denial of service via a large depth of nested objects * CVE-2022-2879: golang: archive/tar: unbounded memory consumption when reading headers * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-27664: golang: net/http: handle server errors after sending GOAWAY * CVE-2022-32189: golang: math/b...

Red Hat Security Advisory 2022-7933-01

Red Hat Security Advisory 2022-7933-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include code execution, denial of service, double free, information leakage, null pointer, out of bounds access, out of bounds write, privilege escalation, and use-after-free vulnerabilities.

RHSA-2022:7933: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36516: kernel: off-path attacker may inject data or terminate victim's TCP session * CVE-2021-3640: kernel: use-after-free vulnerability in function sco_sock_sendmsg() * CVE-2022-0168: kernel: smb2_ioctl_query_info NULL pointer dereference * CVE-2022-0617: kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback * CVE-2022-085...

RHSA-2022:7683: Red Hat Security Advisory: kernel security, bug fix, and enhancement update

An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36516: kernel: off-path attacker may inject data or terminate victim's TCP session * CVE-2020-36558: kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference * CVE-2021-3640: kernel: use-after-free vulnerability in function sco_sock_sendmsg() * CVE-2021-30002: kernel: memory leak for large arguments...

CVE-2022-38701: en/security-disclosure/2022/2022-09.md · OpenHarmony/security - Gitee.com

OpenHarmony-v3.1.2 and prior versions have a heap overflow vulnerability. Local attackers can trigger a heap overflow and get network sensitive information.

Kernel Live Patch Security Notice LSN-0089-1

Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. Ziming Zhang discovered that the netfilter subsystem in the Linux kernel did not properly validate sets with multiple ranged fields. It was discovered that the implementation of POSIX timers in the Linux kernel did not properly clean up timers in some situations. Various other vulnerabilities were also discovered.

Ubuntu Security Notice USN-5484-1

Ubuntu Security Notice 5484-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. It was discovered that a race condition existed in the network scheduling subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5471-1

Ubuntu Security Notice 5471-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.

Ubuntu Security Notice USN-5469-1

Ubuntu Security Notice 5469-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.

Ubuntu Security Notice USN-5470-1

Ubuntu Security Notice 5470-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.

Ubuntu Security Notice USN-5468-1

Ubuntu Security Notice 5468-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.

Ubuntu Security Notice USN-5467-1

Ubuntu Security Notice 5467-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.

Ubuntu Security Notice USN-5466-1

Ubuntu Security Notice 5466-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.

Ubuntu Security Notice USN-5465-1

Ubuntu Security Notice 5465-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.

Kernel Live Patch Security Notice LSN-0086-1

It was discovered that a race condition existed in the network scheduling subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. Yiqi Sun and Kevin Wang discovered that the cgroups implementation in the Linux kernel did not properly restrict access to the cgroups v1 release_agent feature. A local attacker could use this to gain administrative privileges. Various other issues were also addressed.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907