LVS
lvs-users
Google
 
Web LinuxVirtualServer.org

FW: Linux Virtual Server/Secure Context procfs shared permissions flaw

To: <lvs-users@xxxxxxxxxxxxxxxxxxxxxx>
Subject: FW: Linux Virtual Server/Secure Context procfs shared permissions flaw
From: "Peter Mueller" <pmueller@xxxxxxxxxxxx>
Date: Wed, 7 Jul 2004 11:30:30 -0700
Can anyone confirm this?  I don't see anything in the mailing list or
kernel changelogs.  E.g.,
http://www.kernel.org/pub/linux/kernel/v2.4/testing/patch-2.4.27.log.

> -----Original Message-----
> From: Veit Wahlich [mailto:cru@xxxxxxxx] 
> Sent: Saturday, July 03, 2004 7:34 PM
> To: bugtraq@xxxxxxxxxxxxxxxxx
> Subject: Linux Virtual Server/Secure Context procfs shared 
> permissions flaw
> 
> 
> Linux Virtual Server/Secure Context procfs shared permissions flaw
> ==================================================================
> 
> 2004-07-02, Veit Wahlich <cru@xxxxxxxx>
> 
> Official location of this document: 
> http://ircnet.de/article.shtml?vsproc
> 
> 
> Product|
> -------+
> 
> Linux Virtual Server extends the Linux kernel to provide the 
> ability to
> run several virtual servers on a single host system. In contrast to
> other virtualization attempts Linux Virtual Server uses a split-
> userland architechture under a single kernel to optimize 
> sharing of all
> resources and reduce resource consumption overhead per VM to the
> absolute minimum.
> http://www.linux-vserver.org/
> 
> 
> Synopsis|
> --------+
> 
> During a security audit on the vproc security scheme a permission-
> sharing vulnerability was discovered.
> 
> 
> Vulnerable|
> ----------+
> 
> <= 1.27 (Linux 2.4 stable branch)
> <= 1.3.9 (Linux 2.4 devel branch)
> <= 1.9.1 (Linux 2.6 devel branch)
> 
> 
> Severity|
> --------+
> 
> - local DoS
> - creation of information leaks
> 
> See details below.
> 
> 
> History|
> -------+
> 
> 2004-06-30  vuln discovered
> 2004-07-02  vendor informed
> 2004-07-03  first vendor response, confirmation
> 2004-07-04  official fix available, advisory release
> 
> 
> Description|
> -----------+
> 
> While auditing and experimenting with VServer procfs and 
> vproc security
> we discovered a problem sharing permissions on the procfs mounted
> directories:
> 
> Within any context users are still able to change permissions 
> on /proc,
> both access permission and ownership. That is just fine as many people
> would like to restrict access to /proc to the root user or a group of
> trusted users.
> 
> But as changes to a procfs mountpoint do not apply to the mountpoint
> itself but to procfs in general, these changes affect all contexts
> (VServers) and even the host system.
> 
> All tests were done against the stable branch (1.2x) but regarding to
> Herbert Poetzl, the problem exists on both devel branches (1.3.x,
> 1.9.x), too.
> 
> Version 1.28 (stable branch) resolves this problem.
> 
> 
> Exploitation|
> ------------+
> 
> The vulnerability may be locally exploited in two ways:
> 
> 1. From within a virtual server a denial of service attack 
> (DoS) may be
> provoked towards other virtual servers and the host system.
> By setting permissions that prevent users other than root to read
> information from procfs (i.e. process information) will disable a wide
> range of services.
> 
> 2. On systems where access to procfs is allowed to root only (or to a
> group of trusted users; i.e. shared hosting environments), an attacker
> may use access to another virtual server to gain critical information
> about processes or other data on the primary target virtual server (or
> the host system).
> 
> 
> Work-around|
> -----------+
> 
> To work around this problem, procfs may be mounted read-only. On the
> host-system do:
> 
> # mount -o remount,ro /proc
> 
> As this also prevents the host system from changing any values in
> /proc, this should just be a temporary solution!
> 
> 
<Prev in Thread] Current Thread [Next in Thread>