The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[UNIX] Linux Kernel Ext2 Implementation Information Leak


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 4 Apr 2005 12:52:25 +0200
Subject: [UNIX] Linux Kernel Ext2 Implementation Information Leak
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20050404110405.8C35E5777@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Linux Kernel Ext2 Implementation Information Leak
------------------------------------------------------------------------


SUMMARY

Leaked kernel memory can be found in ext2 filesystems either on hard 
drives, removable media (USB thumb drives, flash cards), initrd images, 
UML filesystem images and others.

DETAILS

Vulnerable Systems:
 * Linux version 2.4.29 and prior
 * Linux version 2.4.11.5 and prior

Immune Systems:
 * Linux version 2.4.30-rc2
 * Linux version 2.6.11.6

The function ext2_make_empty() used in the Linux implementation of the 
ext2 filesystem is vulnerable to an information leak. Upon directory 
creation, a new block is obtained from kernel memory to store the initial 
directory entries  ('.' and '..'). This block is used and  written to disk 
uninitialized, leading  to an information leak in the block's slack space.

Depending on block size, up to 4072 (4096 - 2 * 12) bytes of kernel memory 
 can be leaked on each directory creation. This quantity  then decreases 
when additional entries are added  to the directory block.

Since the ext2 implementation uses the dir-in-pagecache design, any part 
of kernel memory is susceptible to be leaked, not only old disk/filesystem 
data.

Vendor Status:
This vulnerability was acknowledged by  the Kernel Security Team and fixed 
in versions 2.4.30-rc2 and 2.6.11.6.

CVE Information:
 <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0400>; 
CAN-2005-0400

Disclosure Timeline:
03/15/2005 - Vulnerability discovered
03/16/2005 - Vulnerability details sent to [email protected] and 
confirmed by kernel maintainers
03/25/2005 - Linux 2.6.11.6 and 2.4.30-rc2 released with fix
04/01/2005 - Public disclosure


ADDITIONAL INFORMATION

The information has been provided by  <mailto:security@arkoon.net.> Arkoon 
Security Team .
The original article can be found at:  
<http://arkoon.net/advisories/ext2-make-empty-leak.txt>; 
http://arkoon.net/advisories/ext2-make-empty-leak.txt




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру