Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 84385 - [03/07] grsecurity 2.1.3 released for 2.4.29/2.6.11
Summary: [03/07] grsecurity 2.1.3 released for 2.4.29/2.6.11
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: New packages (show other bugs)
Hardware: All All
: High normal
Assignee: solar (RETIRED)
URL: http://www.grsecurity.net/news.php#gr...
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2005-03-07 05:11 UTC by Jan Brinkmann (RETIRED)
Modified: 2005-03-08 04:01 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Jan Brinkmann (RETIRED) gentoo-dev 2005-03-07 05:11:04 UTC
an excerpt from the grsecurity website:

grsecurity 2.1.2 has been released today for the 2.4.29 and 2.6.11 kernels. This is a critical release, and all users of grsecurity are strongly urged to upgrade as soon as possible. Changes in this release include the removal of RANDEXEC from the configuration, a fix for the unsafe terminal false positive, the ability to use hostnames instead of IPs in the RBAC policy file, the removal of the randomized TCP ISN, RPC XID, and IP ID code, since they added no greater security that what Linux currently provides, more consistent log messages, and PaX updates. Of particular importance is a fix for an exploitable vulnerability in PaX that exists if the SEGMEXEC or RANDEXEC features are enabled. The vulnerability was found yesterday by the PaX team during an audit of their code. Though remote exploitation of the vulnerability is very unlikely, it can be abused locally to compromise the system. If you have grsecurity configured in the LOW or MEDIUM settings, you are not vulnerable. To mitigate some of the risk imposed by the vulnerability until you can patch your machines, echo "0 0" > /proc/sys/vm/pagetable_cache


sure ,  the security issue is fixed in grsec-sources-2.4.28.2.1.0-r3 but it would be really nice to have this version in the tree. thanks.
Comment 1 Jan Brinkmann (RETIRED) gentoo-dev 2005-03-07 05:12:57 UTC
fyi: i assigned it directly to you because you're the maintainer of the grsec-sources (those which are based on the 2.4.x sources). please correct me if i'm taking things wrong.
Comment 2 solar (RETIRED) gentoo-dev 2005-03-07 07:26:32 UTC
grsecurity 2.1.3 has been released to fix a number of problems found 
during a routine audit of grsecurity. Changes in this release include 
allowed gradm -u for non-root users in a no-authentication special role, 
addition of a missing ptrace hook on amd64, fixed hidden file check that 
takes subject inheritance into account, unification of the mmap hook so 
it no longer requires a per-arch component, and the breakup of the "O" 
subject flag into "O" and "t", where "O" now means to allow writable 
library loads for the process, while "t" allows a process to ptrace any 
task. The "t" mode should be used sparingly in combination with the 
no-ptrace object flag. A bug in PaX that causes a SIGBUS in a task when 
SEGMEXEC is enabled but MPROTECT is disabled has been fixed in this 
release as well.
During the audit, a critical vulnerability was found in the RBAC system 
that effectively gave every subject the "O" flag, allowing a root user 
for instance to gain the privileges of any other process through 
LD_PRELOAD or ptrace. If you have already upgraded to 2.1.2 and use the 
RBAC system, I strongly urge you to upgrade to 2.1.3. To ensure that 
problems like this won't occur in the future, I will be developing an 
extensive regression test suite for the RBAC system similar to the one 
that exists already for non-RBAC features.

Sorry about the timing of this release, but the vuln I discovered is 
quite serious, and I'm hoping to catch the people who haven't updated 
their machines to 2.1.2 yet due to it being released over the weekend.

-Brad
Comment 3 Jan Brinkmann (RETIRED) gentoo-dev 2005-03-08 03:54:15 UTC
grsecurity 2.1.3 has been released to fix a number of problems found during a routine audit of grsecurity. Changes in this release include allowed gradm -u for non-root users in a no-authentication special role, addition of a missing ptrace hook on amd64, fixed hidden file check that takes subject inheritance into account, unification of the mmap hook so it no longer requires a per-arch component, and the breakup of the "O" subject flag into "O" and "t", where "O" now means to allow writable library loads for the process, while "t" allows a process to ptrace any task. The "t" mode should be used sparingly in combination with the no-ptrace object flag. A bug in PaX that causes a SIGBUS in a task when SEGMEXEC is enabled but MPROTECT is disabled has been fixed in this release as well.
During the audit, a critical vulnerability was found in the RBAC system that effectively gave every subject the "O" flag, allowing a root user for instance to gain the privileges of any other process through LD_PRELOAD or ptrace. If you have already upgraded to 2.1.2 and use the RBAC system, I strongly urge you to upgrade to 2.1.3. To ensure that problems like this won't occur in the future, I will be developing an extensive regression test suite for the RBAC system similar to the one that exists already for non-RBAC features.
Comment 4 Jan Brinkmann (RETIRED) gentoo-dev 2005-03-08 04:01:01 UTC
i've seen that's now in the tree, thanks a lot! marking this one as fixed