Bug 612166 - (CVE-2010-2524) CVE-2010-2524 kernel: dns_resolver upcall security issue
CVE-2010-2524 kernel: dns_resolver upcall security issue
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
public=20100722,reported=20100707,imp...
: Security
Depends On: 612136 612168 612169 612170 612171
Blocks:
  Show dependency treegraph
 
Reported: 2010-07-07 09:20 EDT by Eugene Teo (Security Response)
Modified: 2015-02-16 10:44 EST (History)
16 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2012-03-28 04:43:32 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:


Attachments (Terms of Use)

  None (edit)
Description Eugene Teo (Security Response) 2010-07-07 09:20:21 EDT
Description of problem:
CIFS has the ability to chase MS-DFS referrals. In order to do this it has to be able to resolve hostnames into IP addresses. For this, it uses the keys API to upcall to the cifs.upcall userspace helper. It then resolves the name and hands the address back to the kernel.

The dns_resolver upcall currently used by CIFS is susceptible to cache stuffing. It's possible for a malicious user to stuff the keyring with the results of a lookup, and then trick the server into mounting a server of his choosing.
Comment 4 Eugene Teo (Security Response) 2010-07-07 22:05:47 EDT
Statement:

This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, and Red Hat Enterprise MRG as they did not include support for the upcall mechanism for the Common Internet File System (CIFS). This issue was addressed in Red Hat Enterprise Linux 5 via https://rhn.redhat.com/errata/RHSA-2010-0723.html.
Comment 10 Eugene Teo (Security Response) 2010-08-01 23:41:20 EDT
Upstream commit:
http://git.kernel.org/linus/4c0c03ca54f72fdd5912516ad0a23ec5cf01bda7
Comment 11 Chuck Ebbert 2010-08-02 17:15:41 EDT
Fixed upstream in 2.6.35, 2.6.34.2, 2.6.33.7 and 2.6.32.17
Comment 12 Fedora Update System 2010-08-02 20:58:47 EDT
kernel-2.6.32.16-150.fc12 has been pushed to the Fedora 12 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 13 Fedora Update System 2010-08-02 21:10:55 EDT
kernel-2.6.33.6-147.2.4.fc13 has been pushed to the Fedora 13 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 14 Eugene Teo (Security Response) 2010-08-02 23:52:25 EDT
Introduced via commit 6103335de8afa5d780dcd512abe85c696af7b040 (2.6.25-rc1).
Comment 15 errata-xmlrpc 2010-08-10 14:01:54 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2010:0610 https://rhn.redhat.com/errata/RHSA-2010-0610.html

Note You need to log in before you can comment on or make changes to this bug.