Nasty Linux Netfilter Firewall Security Hole Found (zdnet.com) 53
Sophos threat researcher Nick Gregory discovered a hole in Linux's netfilter firewall program that's "exploitable to achieve kernel code execution (via ROP [return-oriented programming]), giving full local privilege escalation, container escape, whatever you want." ZDNet reports: Behind almost all Linux firewalls tools such as iptables; its newer version, nftables; firewalld; and ufw, is netfilter, which controls access to and from Linux's network stack. It's an essential Linux security program, so when a security hole is found in it, it's a big deal. [...] This problem exists because netfilter doesn't handle its hardware offload feature correctly. A local, unprivileged attacker can use this to cause a denial-of-service (DoS), execute arbitrary code, and cause general mayhem. Adding insult to injury, this works even if the hardware being attacked doesn't have offload functionality! That's because, as Gregory wrote to a security list, "Despite being in code dealing with hardware offload, this is reachable when targeting network devices that don't have offload functionality (e.g. lo) as the bug is triggered before the rule creation fails."
This vulnerability is present in the Linux kernel versions 5.4 through 5.6.10. It's listed as Common Vulnerabilities and Exposures (CVE-2022-25636), and with a Common Vulnerability Scoring System (CVSS) score of 7.8), this is a real badie. How bad? In its advisory, Red Hat said, "This flaw allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a privilege escalation threat." So, yes, this is bad. Worse still, it affects recent major distribution releases such as Red Hat Enterprise Linux (RHEL) 8.x; Debian Bullseye; Ubuntu Linux, and SUSE Linux Enterprise 15.3. While the Linux kernel netfilter patch has been made, the patch isn't available yet in all distribution releases.
This vulnerability is present in the Linux kernel versions 5.4 through 5.6.10. It's listed as Common Vulnerabilities and Exposures (CVE-2022-25636), and with a Common Vulnerability Scoring System (CVSS) score of 7.8), this is a real badie. How bad? In its advisory, Red Hat said, "This flaw allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a privilege escalation threat." So, yes, this is bad. Worse still, it affects recent major distribution releases such as Red Hat Enterprise Linux (RHEL) 8.x; Debian Bullseye; Ubuntu Linux, and SUSE Linux Enterprise 15.3. While the Linux kernel netfilter patch has been made, the patch isn't available yet in all distribution releases.
Debian Bullseye (Score:2)
Re: (Score:2)
This vulnerability is present in the Linux kernel versions 5.4 through 5.6.10.
It isn't, you should be fine (assuming the above quote is correct :)
But how hard would it be for zdnet to say "This bug was fixed on kernel 5.6.11 and above" ? It is serious but the article was written by zdnet for sensationalism, as par for the course for them.
Re: (Score:2)
I hate ZDNet. "it affects recent major distribution releases such as Red Hat Enterprise Linux (RHEL) 8.x; Debian Bullseye; Ubuntu Linux, and SUSE Linux Enterprise 15.3."
RHEL 8: 4.18
SLES 15: 5.3.18
the flaw is serious - ZDnet is cr*p.
Re: (Score:3)
Re: (Score:1)
Re:Debian Bullseye (Score:4, Informative)
The quote is wrong - it should have said 5.16.11, Debian Bullseye (if unupdated) is affected.
https://seclists.org/oss-sec/2... [seclists.org] references git commit https://git.kernel.org/pub/scm... [kernel.org] as the fix, originally part of 5.17-rc4, and backported in 5.16.12 (and 5.10.103, and more stable trees).
The (as of now) latest Debian Bullseye kernel security update 5.10.103-1 contains the fix, so if you got that and rebooted after the install you are safe.
Re: (Score:2)
Re: (Score:2)
Good luck with that, moderation here has been broken for a couple of weeks now...
Re: (Score:2)
Works fine for me. I have no mod points.
Re: (Score:2)
If you've had mod points in the last couple of weeks, that's rare. Almost no one has mod points these last few weeks. If you set your comment level to 2, there're very few comments visible as there's nearly no moderation happening. I've also seen spam posts lately sitting at 1, and there's no one to mod them down. I've seen no +5 comments in a long time either. No troll or flamebait moderations that I've seen either. Weirdly, there is at least one user I saw recently whose posts are all -1. But I'm pret
Re: (Score:2)
Good to know. Still not seeing any modded up comments on this story, however. If I set my threshold at -1, and search the page I see no Score:3 or above at all.
Today I would like to thank... (Score:1)
... Theo De Raadt!
Re: (Score:2)
Re: (Score:2)
Few eyeballs make for deep work.
Privilege escalation (Score:2)
All major OSes are vulnerable to privilege escalation exploits. It's just a matter of looking for them. Don't make your security model depend on them not existing.
security starts with you! (Score:2)
Re: (Score:2)
yea. it's not like anyone has ever injected PHP or Python into an HTTP request and had limited access to a 'nobody' account in a chroot or container. ... which you can now escape through yet another major escalation bug.
Linux has a shitty approach to security (Score:2)
Both Linux and Greg K-H have always been dismissive of security vulnerabilities, and insist on treating them as though they were just typical bugs. This is a naive, amateurish, dangerous and unprofessional attitude, not much better than early 2000s Microsoft's approach.
Linux is *full* of security bugs, and the 'many eyes' theorem means little when people are not really looking. This is part of why I switched to NetBSD (FreeBSD is too 'busy', OpenBSD has too much posturing).
Linux development ought to include
Re: (Score:2)
Linux development ought to include consistent scheduled secure code reviews and audits, because security vulnerabilities are not on the same level as other bugs as kernel maintainers insist.
There's nothing stopping you from doing that. Post your findings!
Re: (Score:2)
Why would I waste the effort when the development community has no interest in responding?
Re: (Score:2)
Re: (Score:2)
I never claimed that was the case. The problem is that they don't prioritize vulnerabilities over other bugs.
Re: (Score:2)
Why would I waste the effort when the development community has no interest in responding?
This implies you would not consider the effort a waste, if the community had an interest in responding.
Since we can't very well judge interest other than by judging their behavior, I'm asking you if you have any evidence of the development community not responding.
Your pet OS has had some pretty mid-blowing security vulnerabilities as well.
Does Linux have more? Absolutely. But Linux is also used in somewhere around a few trillion percent more devices. This means the eyes looking for problem
Re: (Score:2)
Sure you did:
No, I didn't. Twisting my words makes you seem desperate.
This implies you would not consider the effort a waste, if the community had an interest in responding.
In the context of my previous statements, it was clear I meant respond *in a timely fashion*.
Your pet OS has had some pretty mid-blowing security vulnerabilities as well.
Sure, every OS does or has had. But the NetBSD team are very quick to fix. I don't have a link handy but I recall reading a paper written, presentation given at BSDCon or something, that the NetBSD team were by far the fastest to patch vulns they were made aware of, patching many in the same night.
This means the eyes looking for problems is much higher.
Not really, it just means people are working on it. People cont
Re: (Score:2)
No, I didn't. Twisting my words makes you seem desperate.
Denying what you wrote makes you seem stupid.
In the context of my previous statements, it was clear I meant respond *in a timely fashion*.
Citation needed. Nowhere in any of our interaction have you alluded anything to the timeliness of any response.
Sure, every OS does or has had. But the NetBSD team are very quick to fix. I don't have a link handy but I recall reading a paper written, presentation given at BSDCon or something, that the NetBSD team were by far the fastest to patch vulns they were made aware of, patching many in the same night.
Of course. That's easy for them. They have the simplest and least featureful OS, with the least amount of users.
Plenty of linux bugs are patched same-day too. What's your point? Average is a silly metric when we're taking into account the fact that very few NetBSD vulnerabilities are ever even found due to the lack of people looking for them.
The only
Re: (Score:2)
Denying what you wrote makes you seem stupid.
Sure, but I'm not doing that. Accusing someone of doing that because you can't follow the conversation certainly makes you seem stupid, which is in line with the rest of your zealous argument.
Citation needed. Nowhere in any of our interaction have you alluded anything to the timeliness of any response.
You have the citation, you just want to ignore it. You're clearly one of those fools that just wants to argue for the sake of arguing because you think it makes you seem smart.
Of course. That's easy for them. They have the simplest and least featureful OS, with the least amount of users.
Patently untrue. There are other OSes used far less. NetBSD is used pretty extensively, just not in domains you would be familiar with. Nor is N
Re: (Score:2)
Re: (Score:1)
I'm sure if ipchains was still around it would be affected too. My point is, I think the issue has been with stack usage and how some processes should not have such authority. Yet we live in a application driven world where they get what they want.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
No, I'm not full of shit, you're just the same cunt AC who has some issue with me lol.
I'd like to see a source on your claim, because it's exactly as I said actually. They don't treat security bugs with the priority they should and express frustration when anyone suggests they should. But hey, if something has changed I'd love to see a source.
Re: (Score:2)
Both Linux and Greg K-H have always been dismissive of security vulnerabilities, and insist on treating them as though they were just typical bugs. This is a naive, amateurish, dangerous and unprofessional attitude, not much better than early 2000s Microsoft's approach.
The curious thing about Linux anyone can scratch their itch and contribute what they fancy to the project. Those who care about security are not powerless.
Linux is *full* of security bugs, and the 'many eyes' theorem means little when people are not really looking. This is part of why I switched to NetBSD (FreeBSD is too 'busy', OpenBSD has too much posturing).
So is everything else...
https://www.netbsd.org/support... [netbsd.org]
This is why people are using hypervisors for security because securing a general purpose operating system is a fools errand.
Linux development ought to include consistent scheduled secure code reviews and audits, because security vulnerabilities are not on the same level as other bugs as kernel maintainers insist.
If you want a secure operating system you will have to design one to be that from scratch. Nobody in their right mind would even attempt such a feat with a monolithic kernel.
Re: (Score:2)
The curious thing about Linux anyone can scratch their itch and contribute what they fancy to the project. Those who care about security are not powerless.
You realize that's a bullshit opinion right? Like sure it's an advantage of open source software, but it's not an excuse to let maintainers off the hook for shitty practices.
So is everything else...
Not the point, the point is how security is handled and prioritized. In the BSD's it's a priority, in Linux not so much.
This is why people are using hypervisors for security because securing a general purpose operating system is a fools errand.
You might think that being loyal to Linux which as such a slack attitude toward security, but it isn't the case.
redhat affected? (Score:1)
Re: (Score:1)
I agree.
RHEL 6 = 2.6.x
RHEL 7 = 3.x
RHEL 8 = 4.x
Re: (Score:2)
Re: (Score:2)
Redhat really likes to backport changes into older versions of things.
So you can't rely on this sort of "Redhat is running version X, this bug was introduced in Y, Y>X, therefore Redhat isn't vulnerable" sort of thinking.
It's going to be true some of the time, but you can't rely on it.
And given that Redhat seems to have given mitigation instructions for this issue and says that it affects RHEL 8.3 and later [redhat.com], I suspect it's an issue after all.
Re: (Score:1)
how bad? (Score:2)
and with a Common Vulnerability Scoring System (CVSS) score of 7.8), this is a real badie.
Don't be fooled by that. I've been trying for years to find any study, whitepaper or other research that shows a correlation between CVSS score and real-world impact, and I've come up empty. None of the other people I've asked know any such thing, either. We're actually thinking about finding a bachelor or master student who'd like to do more extensive research into this as a thesis.
IMHO, CVSS scores have little value, and they especially don' tell you how bad something is.
Re: (Score:2)
Or - https://nvlpubs.nist.gov/nistp... [nist.gov]
Or - https://www.imperva.com/learn/... [imperva.com]
Re: (Score:2)
Re: (Score:2)
Any rule based scoring system is questionable.
Not if the rules are based on observable facts and the connection between them is based on empirical data. We have such systems in medicine and emergency services.
But those are very specific systems. Their score means something like "do these systems indicate a heart attack?" or "does this newborn baby need medical attention or is it fine?"
CVSS is much more general and that's probably its biggest flaw. ...aside from the fact that some of the most important factors are routinely ignored in the real world and
Re: (Score:2)
The process to determine a CVSS does have papers and research behind it,
That it does.
None of the ones I've seen answer the question: "does it work?"
and probably studies too
That is what I don't know. I'm specifically looking for studies that prove that CVSS is more than an overly complicated facade for basically a guess.
Other scoring systems have that. Not in cybersecurity, of course. But in medicine, for example, we have scoring systems with decades of good track record.
LOLOL M$ BAD! (Score:2)
Linux? Oh, this vulnerability affects Linux?. Well, then it doesn't count as a bad thing.
Re: (Score:2)
Well it's not like you paid anything for Linux. So a high ! / $.
Microsoft charges you hundreds of dollars a year and still manages to pick up and run every piece of malware it comes across. It even loads drivers signed with expired certificates [bleepingcomputer.com].
Re: (Score:2)
You're imagining something that never happened.
Security is about 'better' not 'perfect'.
Check The CVE Link In TFA (Score:1)
I checked the CVE link in TFA and found this message at the top of the page:
CVE-2022-25636 Detail
Undergoing Reanalysis
This vulnerability has been modified and is currently undergoing reanalysis. Please check back soon to view the updated vulnerability summary.
And this I found this near the bottom of the page: (some editing required to keep /. filters happy)
Known Affected Software Configurations
Configuration 1
cpe:2.3:o:linux:linux_kernel:
From (including) 5.4 Up to (including) 5.6.10