/srv/irclogs.ubuntu.com/2024/04/25/#ubuntu-security.txt

=== chris14_ is now known as chris14
luna_morning04:58
primalpimmyHello, I have a question related to apparmor. So basically I have a k8s pod that has a host mount to /etc/apparmor.d , and that pod is responsible for generating and enforcing profiles using "apparmor_parser" from within, and then it gets enforced on the host. But for some reason the profile seems to block pods that tries to access the K8s API.  06:08
primalpimmyeven though all network is allowed in the profile 06:08
primalpimmytype=AVC msg=audit(1713956546.682:24729): apparmor="DENIED" operation="create" profile="kubearmor-default" pid=41265 comm="kubearmor" family="inet" sock_type="stream" protocol=0 requested_mask="create" denied_mask="create"06:08
primalpimmyto fix this, I again have to run "apparmor_parser" on the host instead of inside that pod, and now it works as it should.06:10
mcphailhttps://ubuntu.com//blog/whats-new-in-security-for-ubuntu-24-04-lts - thanks for this post, amurray . Is the unprivileged namespace hardening the reason why I can't run docker in a nesting-enabled lxc or lxd container using the noble nightlies? Is there a way around that, if that's the case?07:02
tewardmdeslaur: sarnold: because it came up on Ask Ubuntu (https://askubuntu.com/questions/1511606/pci-audit-openssh-authentication-bypass-vulnerability-cve-2023-51767), I'm poking regarding CVE-2023-51767.  Is only openssh-ssh1 affected?  Or are all openssh servers (and yes it's possible to enforce newer SSH versions if I remember right!) impacted?  The question came up because of PCI/DSS compliance.19:40
-ubottu:#ubuntu-security- OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges. <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51767>19:40
tewardmdeslaur: could we also annotate the bug with https://bugzilla.mindrot.org/show_bug.cgi?id=3656 which states this: "This attack was not demonstrated against stock OpenSSH, but instead against a modified sshd that had extra synchronisation added to make the attack easier. AFAIK achieving the timing required to successfully exploit is close to impossible in the real world. See section 9 of their paper 19:59
tewardhttps://arxiv.org/pdf/2309.02545.pdf They don't mention it, but any kind of ASLR would increase the difficulty of attack by several orders of magnitude. Nobody has demonstrated this attack against a configuration remotely approximating real-world conditions. We consider rowhammer mitigation to the job of the platform, not userspace software."19:59
-ubottu:#ubuntu-security- bugzilla.mindrot.org bug 3656 in Portable OpenSSH "How to fix row hammer attacks?" [Security, New]19:59
tewards/annotate the bug/annotate the CVE/19:59
tewardbecause it looks like the paper on this exploit is not possible in Real World Implementations20:00
JanCso basically this is only relevant if you still use Ubuntu from before 2005?20:04
tewardJanC: from what i'm reading even latest OpenSSH in 24.04 is impacted, but upon additional diving into the linked CVE and its papers on arxiv and other documentation, it requires very specific circumstances to happen20:05
tewardand by very specific I mean modified sshd and a configuration that wouldn't be sane in the real world20:06
JanCand when people change their sshd that's not Ubuntu's responsibility20:10
tewardcorrect20:11
JanCalso, I'd expect this to be mostly a problem on servers, but those would use ECC in most cases...20:11
tewardthe core problem however is PCI/DSS compliance scans are stupid and don't take into account when these CVEs have very VERY specific *theoretical only* cases of exploit20:12
tewardhence the only reason i'm poking xD20:12
JanCand I think ECC would prevent this exploit too?20:12
JanCor at least make it much harder too20:14
tewardyeah that's the point any kind of implementation of ASLR makes it difficult, and Linux has had that since 2005 so20:14
tewardit makes it several orders of magnitude more difficult, and there's no real-world conditions approximated config nor stock OpenSSH confirmed affected by this, especially when we dig into the paper20:15
tewardthis CVE probably should've been marked as an experimental or theory-only case and not a CVCSS 7.0 IMO20:15
sdezielthe paper specifically calls out that ECC isn't a good defense: `in 2019 showed that the ECC countermeasure is not secure either`20:18
JanCit might not be a full defence, but if your system suddenly gets a million ECC errors that would probably make the admins suspicious?  :)20:20
sdezielJanC: yeah that's also my understanding, I just wanted to mention that's no silver bullet unfortunately. HW is hard (too) it seems :)20:27
tewardsdeziel: we also have to keep in mind that there's a lot of mitigations that just *naturally* work and sane defaults tend to mitigate the risk by orders of magnitude20:53
tewardso default kernel ASLR and such, sane configis for a real-world setup, etc. seem to be the proper mitigations, and nobody's proposed or shown a *real world* usable exploit that isn't a shared-neighbor type local-only attack vector with user creds20:54
sdezielteward: I didn't read the paper but a quick look at it showed it talks about password auth which is indeed not a sane config20:58
tewardyeah i glanced it20:58
mdeslaurteward: sure, I'll add the upstream bug to it tomorrow21:06
tewardmdeslaur: thank you kindly21:07
mdeslaurbtw, pretty much everything is vulnerable to rowhammer issues and there's nothing we can do about it except stop using computers21:07
mdeslaurevery year someone comes out with a new practical attack21:07
tewardmdeslaur: true. the problem is PCI/DSS compliance checks flag that as a problem21:07
mdeslaurthat isn't my problem :)21:07
tewarddespite veryone KNOWING rowhammer is still a vulnerability21:07
tewardnope21:07
mdeslaurI will add more details to the CVE tomorrow, I'll take another look at it21:08
tewardbut as long as we annotate the bug with notes, etc. so people can JUSTIFY why it can't be fixed (there is no solution for rowhammer attacks!) things're better21:08
tewardcool cool mdeslaur thanks,21:08

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!