Vigil@nce - Linux kernel: denial of service via Ceph
July 2013 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
A remote attacker can send an invalid Ceph auth_reply message to
the Linux kernel, in order to trigger a denial of service.
Impacted products: Fedora, Linux, MBS
Severity: 2/4
Creation date: 03/07/2013
DESCRIPTION OF THE VULNERABILITY
The Ceph technology stores objects/files on a distributed network.
The experimental Ceph module can be enabled during the compilation
of the Linux kernel, with the CONFIG_CEPH_LIB option.
The auth_reply message is used during the authentication procedure
to Ceph. However, if this message is incomplete, the kernel
dereferences a NULL function pointer ("build_request").
A remote attacker can therefore send an invalid Ceph auth_reply
message to the Linux kernel, in order to trigger a denial of
service.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Linux-kernel-denial-of-service-via-Ceph-13044