Bugzilla – Bug 896384
VUL-0: CVE-2014-6416: kernel: ceph-kmp: libceph: overflow in auth token
Last modified: 2018-02-15 15:37:10 UTC
via brad spengler of grsecurity https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c27a3e4d667fdcad3db7b104f75659478e0c68d8 libceph: do not hard code max auth ticket len We hard code cephx auth ticket buffer size to 256 bytes. This isn't enough for any moderate setups and, in case tickets themselves are not encrypted, leads to buffer overflows (ceph_x_decrypt() errors out, but ceph_decode_copy() doesn't - it's just a memcpy() wrapper). Since the buffer is allocated dynamically anyway, allocated it a bit later, at the point where we know how much is going to be needed. Fixes: http://tracker.ceph.com/issues/8979 Cc: stable@vger.kernel.org Signed-off-by: Ilya Dryomov <ilya.dryomov@inktank.com> Reviewed-by: Sage Weil <sage@redhat.com>
ceph is not present in SLE11-SP1-TD so none of TD branches is affected.
bugbot adjusting priority
> https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c27a3e4d667fdcad3db7b104f75659478e0c68d8 > http://tracker.ceph.com/issues/8979 Bug 8979 says "about 1 month ago ... pushed wip-8979 which removes the fixed buffer size. but, we still need to make things not crash when the auth reply processing fails. that could still happen if we get a huge ticket (>4k) and kmalloc fails on a large page size. or the auth reply from the mon is simply not understood by the client." This apparently has multiple known vulnerability types. Use CVE-2014-6416 for the buffer overflow. Use CVE-2014-6417 for the issue of incorrect handling of kmalloc failures. Use CVE-2014-6418 for ths missing validation of the auth reply. Our guess is that c27a3e4d667fdcad3db7b104f75659478e0c68d8 is intended to address all three of these crash issues, but additional CVE IDs might be needed if there were an incomplete fix.
Affected packages: SLE-11-SP3: ceph-kmp SLE-11-SP3-PRODUCTS: ceph-kmp SLE-11-SP3-UPTU: ceph-kmp
we are actually not maintaining ceph-kmp currently. there is ceph in the -extra flavour, which is unsupported.
as we ship ceph for SLES 11 SP3 soon, we need to fix them.
Lee, is this taken care of by your rbd/libceph backports?
The patch to fix this issue will be included in the in-kernel update for rbd and libceph for SLE 11 SP3 and for SLE 12. For SLE 11 SP3, see bug#917884. For SLE 12 see bug#918255.
Note: this seems to be fixed in SLE 12 already.
SLE12 fix is in patches.kernel.org/patch-3.12.28-29
Fixed in SP3 with changes submitted for bug#917884. Marking as resolved.