First published: Mon Jun 06 2011(Updated: )
It was found that vsftpd, Very Secure FTP daemon, when the network namespace (CONFIG_NET_NS) support was activated in the kernel, used to create a new network namespace per connection. A remote attacker could use this flaw to cause memory pressure (kernel OOM killer protection mechanism to be activated and potentially terminate vsftpd or arbitrary [vsftpd independent] process, which satisfied the OOM killer process selection algorithm). References: [1] <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629373">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629373</a> [2] <a href="https://bugs.launchpad.net/ubuntu/+source/linux/+bug/720095">https://bugs.launchpad.net/ubuntu/+source/linux/+bug/720095</a> Public PoC (from [2]): ====================== The test is started in this way: $ for i in 1 2 3 4 5 6 7 8 ; do ./feedftp $i >/dev/null & done What is observed during the test is that /proc/vmallocinfo grows continually with lines like the following being added: 0xffffe8ffff800000-0xffffe8ffffa00000 2097152 pcpu_get_vm_areas+0x0/0x790 vmalloc 0xffffe8ffffa00000-0xffffe8ffffc00000 2097152 pcpu_get_vm_areas+0x0/0x790 vmalloc 0xffffe8ffffc00000-0xffffe8ffffe00000 2097152 pcpu_get_vm_areas+0x0/0x790 vmalloc vsftpd bug: <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED NOTABUG - vsftpd: Do not create network namespace per connection" href="show_bug.cgi?id=711134">https://bugzilla.redhat.com/show_bug.cgi?id=711134</a> Proposed patches (but has connection rates problem): <a href="http://patchwork.ozlabs.org/patch/88217/">http://patchwork.ozlabs.org/patch/88217/</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <=2.6.32 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Mrg | =2.0 | |
Canonical Ubuntu Linux | =10.10 | |
Canonical Ubuntu Linux | =11.04 | |
Canonical Ubuntu Linux | =11.10 | |
Canonical Ubuntu Linux | =10.04 | |
Debian Debian Linux | =5.0 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.