Vigil@nce - Linux kernel: module loading via AF_ALG and parenthesis
February 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
A local attacker can load a new kernel module, using a socket of
type AF_ALG on the Linux kernel, in order to escalate his
privileges.
Impacted products: Linux
Severity: 2/4
Creation date: 26/01/2015
DESCRIPTION OF THE VULNERABILITY
The Linux kernel supports sockets of type AF_ALG, which are used
to access to the cryptography API when CONFIG_CRYPTO_USER_API=y.
An AF_ALG socket can for example be used to load a new
cryptographic module implementing a hash algorithm. However, the
crypto_lookup_template() function of the crypto/algapi.c file does
not check if the requested module is a cryptographic module.
This vulnerability is a variant of VIGILANCE-VUL-16045 using the
syntax "module(blowfish)".
A local attacker can therefore load a new kernel module, using a
socket of type AF_ALG on the Linux kernel, in order to escalate
his privileges.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Linux-kernel-module-loading-via-AF-ALG-and-parenthesis-16046