Alert.png The wiki is deprecated and due to be decommissioned by the end of September 2022.
The content is being migrated to other supports, new updates will be ignored and lost.
If needed you can get in touch with EGI SDIS team using operations @ egi.eu.

Difference between revisions of "EGI CSIRT:Alerts/Linux-2014-12-17"

From EGIWiki
Jump to navigation Jump to search
Line 1: Line 1:
  ** WHITE information - Unlimited distribution allowed                      **   
  ** WHITE information - Unlimited distribution allowed                      **
  ** see https://wiki.egi.eu/wiki/EGI_CSIRT:TLP for distribution restrictions **
   
   
** see https://wiki.egi.eu/wiki/EGI_CSIRT:TLP for distribution restrictions **
  Title:      EGI SVG/CSIRT Alert/Advisory 'CRITICAL' risk - Linux kernel vulnerabilities  [EGI-ADV-20141217]
EGI CSIRT ADVISORY [EGI-ADV-20141217]
  Title:      'Heads up' EGI SVG/CSIRT Alert/Advisory 'CRITICAL' risk - Linux  
kernel vulnerabilities  [EGI-ADV-20141217]  
   
   
  Date:        2014-12-17
  Date:        2014-12-17
  Updated:    2014-12-18
  Updated:    2014-12-20
   
   
URL:        https://wiki.egi.eu/wiki/EGI_CSIRT:Alerts/Linux-2014-12-17
   
   
URL:        https://wiki.egi.eu/wiki/EGI_CSIRT:Alerts/Linux-2014-12-17 
   
   
Update Summary
==============
   
   
  UPDATE-2014-12-18-1
  + 2014-12-18: Added information about Scientific Linux patches
===================
  + 2014-12-20: Added more details about the vulnerability and fixes
Scientific Linux patches available, see:
   
https://www.scientificlinux.org/sl-errata/slsa-20141997-1/
   
   
   
   
Line 27: Line 20:
  ============
  ============
   
   
  Redhat has announced a series of vulnerabilities in the linux kernel which
  Redhat has announced a series of vulnerabilities in the linux kernel
  have been fixed.
  which have been fixed. The most severe flaw is marked CVE-2014-9322 and
   
  is believed to provide the possibility to escalate unprivileged users'
  Some of these are considered 'Critical' in the EGI environment.
  rights on the system.
 
These have been fixed in RHEL 6.
Not all linux distributions have this fixed yet, in particular we are awaiting
a fix for scientific linux
This advisory will be updated as more fixes become available.  
   
   
Fixes have been published for RHEL 5 and 6 and their derivates as well
as other Linux distributions.
   
   
   
   
Line 44: Line 32:
  =======
  =======
   
   
  Details are available at the Red Hat site [R 1], and at [R 2] for Debian based
  arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not
  systems. [R 3] has information on CentOS.
properly handle faults associated with the Stack Segment (SS) segment
   
  register, which allows local users to gain privileges by triggering an
   
  IRET instruction that leads to access to a GS Base address from the
  wrong space. (quoted from NVD).
   
   
  Risk category
  Risk category
  =============
  =============
   
   
  Some of these issues have been assessed as 'Critical' risk by the EGI CSIRT  
  The issue CVE-2014-9322 been assessed as CRITICAL risk by the EGI CSIRT
  and EGI SVG
  and EGI SVG Risk Assessment Team.
  Risk Assessment Team.
   
   
   
   
Line 60: Line 48:
  =================
  =================
   
   
  Linux kernel
  All Linux kernels in the 3.X series before 3.17.5 unless patched against
   
  this issue.
More information will be added later.  
   
   
   
   
Line 69: Line 56:
   
   
  N/A
  N/A
   
   
  Component installation information
  Component installation information
  ==================================
  ==================================
   
   
  See [R 1][R 2], [R 3]
  For many distributions, patched kernel packages are available. Refer to
your distro's information channels.
   
   
  *NOTE* SITES USING IPoIB (IP over InfiniBand):
  *NOTE* SITES USING IPoIB (IP over InfiniBand):
  The 6.6 kernels seem to have problems with IPoIB (IP over InfiniBand). If that  
  The 6.6 kernels seem to have problems with IPoIB (IP over InfiniBand). If that
  has not been solved (and there is no indication in the errata of that), just  
  has not been solved (and there is no indication in the errata of that), just
  upgrading to the latest 6.6 kernel will not be possible for sites
  upgrading to the latest 6.6 kernel will not be possible for sites
  using IPoIB.
  using IPoIB.
Line 86: Line 73:
  Other sites can contact support@nsc.liu.se if they are
  Other sites can contact support@nsc.liu.se if they are
  interested in our custom kernel.
  interested in our custom kernel.
Further information will be made available later.
   
   
   
   
Line 94: Line 78:
  ===============
  ===============
   
   
  Sites should update as soon as possible, after fixed versions of the version of
  Sites should update as soon as possible.
linux they are using becomes available.  
   
   
  All running resources MUST be either patched or otherwise have a
  All running resources MUST be either patched or otherwise have a
  work-around in place by 2014-12-24  T21:00+01:00. Sites failing to act and/or  
  work-around in place by 2014-12-24  T21:00+01:00. Sites failing to act and/or
  failing to respond to requests from the EGI CSIRT team risk site suspension.  
  failing to respond to requests from the EGI CSIRT team risk site suspension.
   
   
  In effect, all must update before going on leave for Christmas.
  In effect, all must update before going on leave for Christmas.
   
   
  Credit
  Credit
  ======
  ======
   
   
  EGI SVG and CSIRT alerted by Leif Nixon.  
  EGI SVG and CSIRT alerted by Leif Nixon.
  IPoIB issues Kent Engström
  IPoIB issues announced by Kent Engström.
   
   
   
   
Line 113: Line 97:
  ==========
  ==========
   
   
  [R 1] https://rhn.redhat.com/errata/RHSA-2014-1997.html
  + Red Hat: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-9322
  [R 2] For Debian based systems see:
  + Red Hat EL6: https://rhn.redhat.com/errata/RHSA-2014-1997.html
CVE-2012-6657 is fixed in Debian and Ubuntu
  + Red Hat EL5: https://rhn.redhat.com/errata/RHSA-2014-2008.html
https://security-tracker.debian.org/tracker/CVE-2012-6657
  + Scientific Linux 5: https://www.scientificlinux.org/sl-errata/slsa-20142008-1/
http://people.canonical.com/~ubuntu-security/cve/2012/CVE-2012-6657.html
  + Scientific Linux 6: https://www.scientificlinux.org/sl-errata/slsa-20141997-1/
   
  + CentOS: http://lists.centos.org/pipermail/centos-announce/2014-December/020838.html
CVE-2014-3673 is fixed in Debian and Ubuntu
  + Debian: https://security-tracker.debian.org/tracker/CVE-2014-9322
https://security-tracker.debian.org/tracker/CVE-2014-3673
  + Ubuntu: http://people.canonical.com/~ubuntu-security/cve/CVE-2014-9322
http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3673.html
  + NIST NVD: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9322
   
CVE-2014-3687 is fixed in Debian and Ubuntu
https://security-tracker.debian.org/tracker/CVE-2014-3687
  http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3687.html
CVE-2014-3688 is fixed in Debian and Ubuntu
https://security-tracker.debian.org/tracker/CVE-2014-3688
  http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3688.html
CVE-2014-5471 is fixed in Debian and Ubuntu
https://security-tracker.debian.org/tracker/CVE-2014-5471
http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-5471.html
   
CVE-2014-5472 is fixed in Debian and Ubuntu
https://security-tracker.debian.org/tracker/CVE-2014-5472
  http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-5472.html
CVE-2014-6410 is fixed in Debian and Ubuntu
https://security-tracker.debian.org/tracker/CVE-2014-6410
http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-6410.html
CVE-2014-9322 is fixed in Debian, needs triage on some Ubuntu versions
  https://security-tracker.debian.org/tracker/CVE-2014-9322
http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-9322.html
   
   
[R 3] announcements for CentOS security updates, check  CESA messages on
  lists.centos.org/pipermail/centos-announce/
for example:
http://lists.centos.org/pipermail/centos-announce/2014-December/020838.html
   
   
  Timeline
  Timeline
  ========
  ========
  Yyyy-mm-dd
  Yyyy-mm-dd
   
   
  2014-12-16 Vulnerabilities publicly announced
  2014-12-16 Vulnerabilities publicly announced
  2014-12-17 SVG alerted to vulnerabilities by Leif Nixon  
  2014-12-17 SVG alerted to vulnerabilities by Leif Nixon
  2014-12-17 CSIRT and SVG assess risk as 'Critical'  
  2014-12-17 CSIRT and SVG assess risk as 'Critical'
  2014-12-17 Heads up/Alert sent to sites.
  2014-12-17 Heads up/Alert sent to sites.

Revision as of 15:48, 20 December 2014

** WHITE information - Unlimited distribution allowed                       **
** see https://wiki.egi.eu/wiki/EGI_CSIRT:TLP for distribution restrictions ** 

Title:       EGI SVG/CSIRT Alert/Advisory 'CRITICAL' risk - Linux kernel vulnerabilities  [EGI-ADV-20141217]

Date:        2014-12-17
Updated:     2014-12-20

URL:         https://wiki.egi.eu/wiki/EGI_CSIRT:Alerts/Linux-2014-12-17


Update Summary
==============

+ 2014-12-18: Added information about Scientific Linux patches
+ 2014-12-20: Added more details about the vulnerability and fixes


Introduction
============

Redhat has announced a series of vulnerabilities in the linux kernel
which have been fixed. The most severe flaw is marked CVE-2014-9322 and
is believed to provide the possibility to escalate unprivileged users'
rights on the system.

Fixes have been published for RHEL 5 and 6 and their derivates as well
as other Linux distributions.


Details
=======

arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not
properly handle faults associated with the Stack Segment (SS) segment
register, which allows local users to gain privileges by triggering an
IRET instruction that leads to access to a GS Base address from the
wrong space. (quoted from NVD).

Risk category
=============

The issue CVE-2014-9322 been assessed as CRITICAL risk by the EGI CSIRT
and EGI SVG Risk Assessment Team.


Affected software
=================

All Linux kernels in the 3.X series before 3.17.5 unless patched against
this issue.


Mitigation
==========

N/A

Component installation information
==================================

For many distributions, patched kernel packages are available.  Refer to
your distro's information channels.

*NOTE* SITES USING IPoIB (IP over InfiniBand):
The 6.6 kernels seem to have problems with IPoIB (IP over InfiniBand). If that
has not been solved (and there is no indication in the errata of that), just
upgrading to the latest 6.6 kernel will not be possible for sites
using IPoIB.
NSC is currently building a 6.5 kernel with the critical security patch
applied. That should enable us to continue running IPoIB.

Other sites can contact support@nsc.liu.se if they are
interested in our custom kernel.


Recommendations
===============

Sites should update as soon as possible.

All running resources MUST be either patched or otherwise have a
work-around in place by 2014-12-24  T21:00+01:00. Sites failing to act and/or
failing to respond to requests from the EGI CSIRT team risk site suspension.

In effect, all must update before going on leave for Christmas.


Credit
======

EGI SVG and CSIRT alerted by Leif Nixon.
IPoIB issues announced by Kent Engström.


References
==========

+ Red Hat: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-9322
+ Red Hat EL6: https://rhn.redhat.com/errata/RHSA-2014-1997.html
+ Red Hat EL5: https://rhn.redhat.com/errata/RHSA-2014-2008.html
+ Scientific Linux 5: https://www.scientificlinux.org/sl-errata/slsa-20142008-1/
+ Scientific Linux 6: https://www.scientificlinux.org/sl-errata/slsa-20141997-1/
+ CentOS: http://lists.centos.org/pipermail/centos-announce/2014-December/020838.html
+ Debian: https://security-tracker.debian.org/tracker/CVE-2014-9322
+ Ubuntu: http://people.canonical.com/~ubuntu-security/cve/CVE-2014-9322
+ NIST NVD: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9322


Timeline
========
Yyyy-mm-dd

2014-12-16 Vulnerabilities publicly announced
2014-12-17 SVG alerted to vulnerabilities by Leif Nixon
2014-12-17 CSIRT and SVG assess risk as 'Critical'
2014-12-17 Heads up/Alert sent to sites.