Bug 460857 - kernel: devmem: add range_is_allowed() check to mmap_mem() [rhel-5.3]
Summary: kernel: devmem: add range_is_allowed() check to mmap_mem() [rhel-5.3]
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 5
Classification: Red Hat
Component: kernel
Version: 5.3
Hardware: All
OS: Linux
high
high
Target Milestone: rc
: ---
Assignee: Eugene Teo (Security Response)
QA Contact: Martin Jenner
URL:
Whiteboard:
Depends On:
Blocks: 460858 460859 460862 460863
TreeView+ depends on / blocked
 
Reported: 2008-09-02 03:53 UTC by Eugene Teo (Security Response)
Modified: 2010-03-14 21:31 UTC (History)
8 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
A deficiency in the Linux kernel made it possible for a privileged application to bypass existing /dev/mem restrictions. Consequently, it was possible to inject malicious code into the physical memory. Additional checks were added to mmap_mem(), which resolves this security issue.
Clone Of:
Environment:
Last Closed: 2009-01-20 19:52:38 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2009:0225 0 normal SHIPPED_LIVE Important: Red Hat Enterprise Linux 5.3 kernel security and bug fix update 2009-01-20 16:06:24 UTC

Description Eugene Teo (Security Response) 2008-09-02 03:53:35 UTC
Description of problem:
Eugene Teo discovered that range_is_allowed() check is only added in {read,write}_mem(). It is possible for an illegitimate application to bypass these checks, and access /dev/mem beyond the 1M limit by calling mmap_mem() instead.

Comment 1 Eugene Teo (Security Response) 2008-09-02 04:06:23 UTC
phalanx2 rootkit uses mmap to bypass the check, and access /dev/mem between 0 and 8000000.

By adding the range_is_allow() check in mmap_mem(), it is possible to prevent phalanx2 or any other illegitimate application from injecting code into /dev/mem.

 =*=*=*=*=*=*=*=*=*=*=*=*=*=*=
|           phalanx2          |
|       %rebel% . 2008        |
 =*=*=*=*=*=*=*=*=*=*=*=*=*=*=
AUDIT_STATUS: enabled=0 flag=1 pid=4436 rate_limit=0 backlog_limit=320 lost=0 backlog=0
:( could not map memory
 
mmap2(NULL, 134217728, PROT_READ|PROT_WRITE, MAP_SHARED, 3, 0) = -1 EPERM (Operation not permitted)

References:
http://isc.sans.org/diary.html?storyid=4937
http://hep.uchicago.edu/admin/report_072808.html

Comment 2 Eugene Teo (Security Response) 2008-09-02 04:07:32 UTC
This appears to be fixed in upstream since commit e2beb3eae.

Comment 7 Eugene Teo (Security Response) 2008-09-02 08:10:22 UTC
(In reply to comment #6)
> I suggest to use this:
> http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=e2beb3eae627211b67e456c53f946cede2ac10d7

Agree that we should stay closer to upstream. I will re-backport the patch.

Thanks, Eugene

Comment 9 RHEL Program Management 2008-09-02 18:43:36 UTC
This request was evaluated by Red Hat Product Management for inclusion in a Red
Hat Enterprise Linux maintenance release.  Product Management has requested
further review of this request by Red Hat Engineering, for potential
inclusion in a Red Hat Enterprise Linux Update release for currently deployed
products.  This request is not yet committed for inclusion in an Update
release.

Comment 10 Don Zickus 2008-09-13 01:48:08 UTC
in kernel-2.6.18-113.el5
You can download this test kernel from http://people.redhat.com/dzickus/el5

Comment 20 errata-xmlrpc 2009-01-20 19:52:38 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2009-0225.html


Note You need to log in before you can comment on or make changes to this bug.