|
|
Subscribe / Log in / New account

CVE-2018-5390 and "embargoes"

By Jake Edge
August 14, 2018

A kernel bug that allows a remote denial of service via crafted packets was fixed recently and the resulting patch was merged on July 23. But an announcement of the flaw (which is CVE-2018-5390) was not released until August 6—a two-week window where users were left in the dark. It was not just the patch that might have alerted attackers; the flaw was publicized in other ways, as well, before the announcement, which has led to some discussion of embargo policies on the oss-security mailing list. Within free-software circles, embargoes are generally seen as a necessary evil, but delaying the disclosure of an already-public bug does not sit well.

The bug itself, which Red Hat calls SegmentSmack, gives a way for a remote attacker to cause the CPU to spend all of its time reassembling packets from out-of-order segments. Sending tiny crafted TCP segments with random offsets in an ongoing session would cause the out-of-order queue to fill; processing that queue could saturate the CPU. According to Red Hat, a small amount of traffic (e.g. 2kbps) could cause the condition but, importantly, it cannot be done using spoofed IP addresses, so filtering may be effective, which may blunt the impact somewhat.

The "semi-embargo" for CVE-2018-5390 came about because CERT was apparently coordinating with Linux distributions (and with FreeBSD on a separate flaw that was reported at the same time). But a tweet by grsecurity highlighted the flaw on July 23; that was followed up with another tweet on July 28 when stable kernels incorporating the fix were released. Matthew Garrett eventually alerted the oss-security mailing list about the bug on August 8. The closed distros and linux-distros mailing lists were used to coordinate the response; those lists have a requirement that, once the bug is made public, the original reporter should post about it to oss-security.

Garrett's post was fairly light on details, which didn't sit well with Stiepan A. Kovac. He asked for more information and seemed to threaten some sort of lawsuit against the "opaque Linux-distros vulnerability-disclosure-among-friends-for-fun-and-profit scheme". While Alexander Peslyak (better known as "Solar Designer"), who founded and moderates all of these security mailing lists (oss-security, distros, linux-distros), agreed that more details were needed and that Kovac's complaint about the semi-embargo raised a real issue, he did think the "focus on legal aspects" was unfortunate. He described the timeline of the bug disclosure as follows:

2018/07/23 - the commit referenced above
2018/07/23 - notification from CERT to some distros
2018/07/23 - grsecurity tweet linking to the commit
2018/07/27 - posting to linux-distros
2018/08/06 - CERT Vulnerability Note published
2018/08/08 - posting to oss-security

Peslyak is not happy about how that all played out. For one thing, the distros lists are meant to be used only for non-public vulnerabilities. The public fix and subsequent tweet publicized the bug fairly widely, which meant that it should not have been handled in "secret" on those lists:

Of course, I am unhappy about this semi-embargo, and even more unhappy about the semi-violation of linux-distros list policy on only having non-public issues in there. However, with CERT involved and with related issues affecting more than just Linux, there was little I could do, short of playing full BOFH and breaking the semi-embargo for everyone. While I think that would have been for the general public's benefit overall, I didn't feel about it strongly enough to actually do it this time.

He speculated on the reasons why the reporting of the bug may have languished, but he also was not pleased with the two-day delay getting any information to oss-security:

It appears that everyone involved, including the CERT people, Matthew, and others commenting on the linux-distros thread, were unhappy about the publication delay. No one I saw said that they wanted the delay. Yet somehow CERT didn't pull the trigger sooner. I guess two weeks feels very soon for CERT as it is, even if it is a very long embargo for linux-distros. Also, I guess the discoverer/reporter of the issue had a say on it behind the scenes, and other related issues and non-Linux were considered in CERT's decision-making.

I am also unhappy about the two-day delay between publication of the CERT Vulnerability Note and the mandatory posting to oss-security (it's mandatory since the issue was on linux-distros). I've been pinging off-list to make this happen at all, and would have probably made the posting myself if it didn't happen for another day.

Garrett apologized for the delay in posting to oss-security (which presumably means he was the one that brought the issue to the distros lists) and for the lack of additional information. Peslyak and others did ensure that those details were posted, however. While the distros lists have a long list of policies and procedures for participants and reporters, it seems clear that this particular bug went its own way—potentially to the detriment of Linux users.

Peslyak speculated that the original bug reporter, Juha-Matti Tilli of Aalto University, Department of Communications and Networking, and Nokia Bell Labs, was also involved in the decision-making on the disclosure of the bug, which may have slowed things down. In addition, the semi-related FreeBSD bug (CVE-2018-6922) got into the mix since it was reported at the same time. However, it was apparently known to the participants in the distros thread(s) that the issue was, at least partly, public; that would have allowed the bug to be exploited by black hats, while leaving most of the rest of the community out in the cold. It would not be surprising to see future public "non-public" bugs be treated quite differently; it seems unlikely that Peslyak would allow this kind of situation to happen again.

Embargoes are meant to be short, at least in the free-software world. As Intel found out with the Spectre and Meltdown disclosure mess, a poorly organized, long embargo is likely to lead to leaks. It should be noted that the L1TF vulnerabilities that were announced on August 14 had been reported to Intel in early January; that too is a long time to keep a secret, but apparently lessons were learned and this set of bug fixes went more smoothly than the last. Hardware flaws affecting multiple operating systems, cloud providers, and others are likely to require a longer coordination period, but the longer flaws are hidden—and the number of people "in the know" increases—the more likely premature disclosure is.

In the case of CVE-2018-5390, though, we don't exactly have a case of premature disclosure. The bug was plainly fixed in full view (and that fix was highlighted by a well-known security researcher). There is little to be gained—and much to be lost—by "hiding" the vulnerability at that point. The horse is loose, so the state of the barn door is immaterial.


Index entries for this article
SecurityBug reporting


to post comments

CVE-2018-5390 and "embargoes"

Posted Aug 14, 2018 21:36 UTC (Tue) by fuhchee (guest, #40059) [Link] (4 responses)

Thanks to @grsecurity for bringing attention to the commit.

CVE-2018-5390 and "embargoes"

Posted Aug 18, 2018 10:28 UTC (Sat) by ldarby (guest, #41318) [Link] (3 responses)

Not sure if you realise but bringing attention to it before the fix has a chance to be distributed increases the risk of blackhats finding it and using it against innocent sites. What is the benefit of that?

CVE-2018-5390 and "embargoes"

Posted Aug 18, 2018 17:40 UTC (Sat) by andresfreund (subscriber, #69562) [Link]

PR for grsecurity.

CVE-2018-5390 and "embargoes"

Posted Aug 19, 2018 21:18 UTC (Sun) by fuhchee (guest, #40059) [Link] (1 responses)

A patch committed to a public git server has 100% chance of being distributed.

CVE-2018-5390 and "embargoes"

Posted Aug 24, 2018 8:48 UTC (Fri) by Wol (subscriber, #4433) [Link]

And installed on vulnerable systems?

You should NOT be making noise about a bug until the patch is actually in the distros update systems. Which is the whole point of an embargo.

Just because a patch has a *chance* of being distributed, doesn't mean it's going to hit the systems that need it. If the distros are actually rolling out the patch, then most systems that are going to be fixed WILL be fixed, hopefully before the bug gets publicised.

We can't afford to worry about the systems that won't ever be fixed, but we shouldn't gratuitously endanger the systems that will be fixed as soon as the user gets the chance.

Cheers,
Wol

CVE-2018-5390 and "embargoes"

Posted Aug 15, 2018 5:39 UTC (Wed) by shemminger (subscriber, #5739) [Link]

It seems fragmentsmack went the other way. It was disclosed before the fixes were even merged in Linus's tree.

CVE-2018-5390 and "embargoes"

Posted Aug 15, 2018 10:22 UTC (Wed) by gebi (guest, #59940) [Link]

funny how the fix is to change the sysctl variables back to their original values from the old times.

Is this attack really something new?
I remember ressource exhaustion through heavy fragmenting way back in the 2.6 kernel days....

Back than those attacks worked on nearly every network equipment, today at least IDS and FW still have problems with it

CVE-2018-5390 and "embargoes"

Posted Aug 15, 2018 11:10 UTC (Wed) by NAR (subscriber, #1313) [Link] (1 responses)

Could this be (partly) caused by the fact that this happened in the middle of the (northern hemisphere) summer and "everybody" was on vacation?

CVE-2018-5390 and "embargoes"

Posted Aug 22, 2018 9:37 UTC (Wed) by emilfihlman (guest, #125032) [Link]

Extremely likely to have played at least some part.


Copyright © 2018, Eklektix, Inc.
This article may be redistributed under the terms of the Creative Commons CC BY-SA 4.0 license
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds