Bug 1172806 (CVE-2014-9322) - CVE-2014-9322 kernel: x86: local privesc due to bad_iret and paranoid entry incompatibility
Summary: CVE-2014-9322 kernel: x86: local privesc due to bad_iret and paranoid entry i...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2014-9322
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1172809 1172810 1172811 1172812 1172813 1172814 1172945 1173083 1173084 1173085 1173591 1173592 1175501
Blocks: 1170693
TreeView+ depends on / blocked
 
Reported: 2014-12-10 19:31 UTC by Petr Matousek
Modified: 2023-05-12 06:29 UTC (History)
26 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
A flaw was found in the way the Linux kernel handled GS segment register base switching when recovering from a #SS (stack segment) fault on an erroneous return to user space. A local, unprivileged user could use this flaw to escalate their privileges on the system.
Clone Of:
Environment:
Last Closed: 2015-01-06 20:20:16 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2014:1997 0 normal SHIPPED_LIVE Important: kernel security and bug fix update 2014-12-17 00:12:55 UTC
Red Hat Product Errata RHSA-2014:1998 0 normal SHIPPED_LIVE Important: kernel-rt security update 2014-12-16 23:51:30 UTC
Red Hat Product Errata RHSA-2014:2008 0 normal SHIPPED_LIVE Important: kernel security update 2014-12-17 23:28:07 UTC
Red Hat Product Errata RHSA-2014:2009 0 normal SHIPPED_LIVE Important: kernel security update 2014-12-17 23:38:35 UTC
Red Hat Product Errata RHSA-2014:2010 0 normal SHIPPED_LIVE Important: kernel security update 2014-12-18 13:23:19 UTC
Red Hat Product Errata RHSA-2014:2028 0 normal SHIPPED_LIVE Important: kernel security update 2014-12-22 23:51:03 UTC
Red Hat Product Errata RHSA-2014:2029 0 normal SHIPPED_LIVE Important: kernel security update 2014-12-23 00:13:38 UTC
Red Hat Product Errata RHSA-2014:2030 0 normal SHIPPED_LIVE Important: kernel security update 2014-12-23 00:13:27 UTC
Red Hat Product Errata RHSA-2014:2031 0 normal SHIPPED_LIVE Important: kernel security update 2014-12-23 00:01:45 UTC
Red Hat Product Errata RHSA-2015:0009 0 normal SHIPPED_LIVE Important: kernel security update 2015-01-06 00:48:05 UTC

Description Petr Matousek 2014-12-10 19:31:55 UTC
It was found that because paranoid entry does not contain the swapgs fixup for
bad_iret (unlike error entry), under certain conditions (#SS on iret) it can
happen that bad_iret is reached with usergs instead of kernelgs that it is
expecting.

A local unprivileged user can use this flaw to increase their privileges on
the system.

Upstream fix:
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6f442be2fb22be02cafa606f1769fa1e6f894441

Acknowledgements:

Red Hat would like to thank Andy Lutomirski for reporting this issue.

Comment 1 Petr Matousek 2014-12-10 19:32:23 UTC
Statement:

This issue does affect the Linux kernel packages as shipped with Red Hat
Enterprise Linux 4, 5, 6, and 7, and Red Hat Enterprise MRG 2. Future Linux
kernel updates for the respective releases will address this issue.

Comment 4 Petr Matousek 2014-12-10 19:36:03 UTC
Fedora included the patch for this issue as part of the CVE-2014-9090 fix and the impact was limited to local DoS due to the espfix64 functionality.

Comment 9 errata-xmlrpc 2014-12-16 18:52:05 UTC
This issue has been addressed in the following products:

  MRG for RHEL-6 v.2

Via RHSA-2014:1998 https://rhn.redhat.com/errata/RHSA-2014-1998.html

Comment 10 errata-xmlrpc 2014-12-16 19:14:38 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2014:1997 https://rhn.redhat.com/errata/RHSA-2014-1997.html

Comment 13 errata-xmlrpc 2014-12-17 18:28:32 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 5

Via RHSA-2014:2008 https://rhn.redhat.com/errata/RHSA-2014-2008.html

Comment 14 errata-xmlrpc 2014-12-17 18:39:00 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.5 EUS - Server and Compute Node Only

Via RHSA-2014:2009 https://rhn.redhat.com/errata/RHSA-2014-2009.html

Comment 15 errata-xmlrpc 2014-12-18 08:23:48 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2014:2010 https://rhn.redhat.com/errata/RHSA-2014-2010.html

Comment 16 errata-xmlrpc 2014-12-22 18:51:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.2 AUS

Via RHSA-2014:2028 https://rhn.redhat.com/errata/RHSA-2014-2028.html

Comment 17 errata-xmlrpc 2014-12-22 19:02:04 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 5.6 Long Life

Via RHSA-2014:2031 https://rhn.redhat.com/errata/RHSA-2014-2031.html

Comment 18 errata-xmlrpc 2014-12-22 19:14:26 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 5.9 EUS - Server Only

Via RHSA-2014:2029 https://rhn.redhat.com/errata/RHSA-2014-2029.html

Comment 19 errata-xmlrpc 2014-12-22 19:19:04 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.4 EUS - Server and Compute Node Only

Via RHSA-2014:2030 https://rhn.redhat.com/errata/RHSA-2014-2030.html

Comment 21 errata-xmlrpc 2015-01-05 19:48:14 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 4 Extended Lifecycle Support

Via RHSA-2015:0009 https://rhn.redhat.com/errata/RHSA-2015-0009.html

Comment 26 Martin Prpič 2015-07-07 11:44:56 UTC
Detailed analysis of this issue has been posted on oss-sec:

http://seclists.org/oss-sec/2015/q3/25


Note You need to log in before you can comment on or make changes to this bug.