Bug 478699 (CVE-2009-1046) - VUL-0: CVE-2009-1046: kernel: The Linux kernel is prone to a local privilege-escalation vulnerability
Summary: VUL-0: CVE-2009-1046: kernel: The Linux kernel is prone to a local privilege-...
Status: RESOLVED FIXED
Alias: CVE-2009-1046
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: All SLES 10
: P2 - High : Major
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard: wasL3:30864 maint:released:sle10-sp2:...
Keywords: DSLA_REQUIRED, DSLA_SOLUTION_PROVIDED
Depends on:
Blocks:
 
Reported: 2009-02-23 17:27 UTC by Chris Beck
Modified: 2018-10-03 09:33 UTC (History)
7 users (show)

See Also:
Found By: SUSE Technical Services
Services Priority: 500
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Chris Beck 2009-02-23 17:27:57 UTC
Linux Kernel Console Selection Local Privilege Escalation Vulnerability

The Linux kernel is prone to a local privilege-escalation vulnerability.

A local attacker can exploit this issue to execute arbitrary code with elevated privileges or crash the affected kernel, denying service to legitimate users.

Versions prior to Linux kernel 2.6.28.4 are vulnerable. 

Based on the description of commit 8255fc826e58c0a59711029e01db9fcdc06ba211 we beleive this is the fix.  We need to make sure that this fix is in our next SP release.  Please let me know if you need further info.  Following are some links with a little more information:

http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.28.y.git;a=commit;h=8255fc826e58c0a59711029e01db9fcdc06ba211

https://lists.innerweb.novell.com/pipermail/linux/2009-February/033421.html


http://www.securityfocus.com/bid/33672/discuss
Comment 1 Greg Kroah-Hartman 2009-02-23 17:42:50 UTC
Is there really such a problem with the SLE10 kernel tree that can be proven to be vulnerable?

Do you have a test/exploit to verify that it is fixed?

I have not seen anything to show that this is anything more than a possible local DoS, not a code execution issue. Do you know anything to the contrary?
Comment 2 Greg Kroah-Hartman 2009-02-24 00:50:19 UTC
Patch applied to SLE10 SP2 kernel tree, awaiting test script to verify it is done properly.
Comment 3 Marcus Meissner 2009-02-24 08:57:25 UTC
this is the at-most-3 byte kmalloc area overwrite, possible from linux console.

explotability unproven, no CVE assigned yet I think.
Comment 4 Greg Kroah-Hartman 2009-02-24 18:51:14 UTC
Closing out as this is commited to our SLE10 tree, and it's not a real issue.
Comment 5 Chris Beck 2009-02-24 20:48:10 UTC
Thank you Greg.  As long as it is in the tree and will be part of the next maintenance release, this will be sufficient.
Comment 6 Greg Kroah-Hartman 2009-02-24 20:57:47 UTC
(In reply to comment #5)
> Thank you Greg.  As long as it is in the tree and will be part of the next
> maintenance release, this will be sufficient.

Sufficient for what?  I'm curious as to what the real issue here is, can you please explain?
Comment 7 Marcus Meissner 2009-02-24 21:10:00 UTC
i guess for the paranoid customer/partner.
Comment 9 Ludwig Nussel 2009-03-24 09:17:36 UTC
Name: CVE-2009-1046

The console selection feature in the Linux kernel 2.6.28 before 2.6.28.4, 2.6.25, and possibly earlier versions, when the UTF-8 console is used, allows physically proximate attackers to cause a denial of service (memory corruption) by selecting a small number of 3-byte UTF-8 characters, which triggers an "an off-by-two memory error." NOTE: it is not clear whether this issue crosses privilege boundaries.      
        

Reference: BID: http://www.securityfocus.com/bid/33672
Reference: MLIST: http://lists.openwall.net/linux-kernel/2009/02/02/364
Reference: MLIST: http://lists.openwall.net/linux-kernel/2009/01/30/333
Reference: MLIST: http://www.openwall.com/lists/oss-security/2009/02/12/9
Reference: MLIST: http://www.openwall.com/lists/oss-security/2009/02/12/11
Reference: MLIST: http://www.openwall.com/lists/oss-security/2009/02/12/10
Reference: CONFIRM: http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.4
Comment 10 Marcus Meissner 2009-04-03 12:56:34 UTC
A kernel update for SUSE Linux Enterprise 10 SP2 was just released that mentions/fixes this bug. The version is 2.6.16.60-0.37_f594963d (last hex string is a GIT id).
Comment 11 Swamp Workflow Management 2009-04-03 22:10:08 UTC
Update released for: kernel-bigsmp, kernel-bigsmp-debuginfo, kernel-debug, kernel-debug-debuginfo, kernel-default, kernel-default-debuginfo, kernel-kdump, kernel-kdump-debuginfo, kernel-kdumppae, kernel-kdumppae-debuginfo, kernel-smp, kernel-smp-debuginfo, kernel-source, kernel-source-debuginfo, kernel-syms, kernel-syms-debuginfo, kernel-vmi, kernel-vmi-debuginfo, kernel-vmipae, kernel-vmipae-debuginfo, kernel-xen, kernel-xen-debuginfo, kernel-xenpae, kernel-xenpae-debuginfo
Products:
SLE-DEBUGINFO 10-SP2 (i386)
SLE-DESKTOP 10-SP2 (i386)
SLE-SDK 10-SP2 (i386)
SLE-SERVER 10-SP2 (i386)
Comment 12 Marcus Meissner 2009-08-03 13:25:24 UTC
root exploit with this issue was confirmed:

http://kernelbof.blogspot.com/2009/07/even-when-one-byte-matters.html
Comment 13 Marcus Meissner 2009-08-03 14:11:21 UTC
should be fixed in all branches as it is exploitable.

SLE11 / 11.1 was shipped non-affected (it has it via: patches.kernel.org/patch-2.6.27.14-15)


SL103_BRANCH did not have the utf8 console.

So just SL110_BRANCH needs the fix.
Comment 14 Jeff Mahoney 2009-08-04 15:17:29 UTC
Patch committed to SL110_BRANCH.
Comment 15 Swamp Workflow Management 2009-08-20 10:07:53 UTC
Update released for: acerhk-kmp-debug, acx-kmp-debug, appleir-kmp-debug, at76_usb-kmp-debug, atl2-kmp-debug, aufs-kmp-debug, dazuko-kmp-debug, drbd-kmp-debug, gspcav-kmp-debug, iscsitarget-kmp-debug, ivtv-kmp-debug, kernel-debug, kernel-default, kernel-docs, kernel-kdump, kernel-pae, kernel-ppc64, kernel-ps3, kernel-source, kernel-syms, kernel-vanilla, kernel-xen, kqemu-kmp-debug, nouveau-kmp-debug, omnibook-kmp-debug, pcc-acpi-kmp-debug, pcfclock-kmp-debug, tpctl-kmp-debug, uvcvideo-kmp-debug, virtualbox-ose-kmp-debug, vmware-kmp-debug, wlan-ng-kmp-debug
Products:
openSUSE 11.0 (debug, i386, ppc, x86_64)
Comment 16 Ludwig Nussel 2009-08-20 12:46:22 UTC
released
Comment 17 Thomas Biege 2009-10-14 03:11:55 UTC
CVE-2009-1046: CVSS v2 Base Score: 4.7 (AV:L/AC:M/Au:N/C:N/I:N/A:C)