{"id":1068,"date":"2018-11-29T15:32:57","date_gmt":"2018-11-29T15:32:57","guid":{"rendered":"http:\/\/blogs.uo.edu.cu\/seginf\/?p=1068"},"modified":"2018-11-29T15:34:58","modified_gmt":"2018-11-29T15:34:58","slug":"denegacion-de-servicio-en-el-kernel-de-linux","status":"publish","type":"post","link":"https:\/\/blogs.uo.edu.cu\/seginf\/?p=1068","title":{"rendered":"Denegaci\u00f3n de servicio en el kernel de Linux."},"content":{"rendered":"<p class=\"rtejustify\" style=\"text-align: justify\">\n\t<img loading=\"lazy\" decoding=\"async\" alt=\"\" class=\"alignleft size-full wp-image-1071\" height=\"200\" src=\"http:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2018\/11\/linux-def200x200_4.png\" style=\"margin-left: 4px;margin-right: 4px\" title=\"\" width=\"200\" srcset=\"https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2018\/11\/linux-def200x200_4.png 200w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2018\/11\/linux-def200x200_4-150x150.png 150w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/>Las vulnerabilidades, de gravedad media, se deben a&nbsp;<strong>desreferencias a punteros nulos<\/strong>, y podr&iacute;an ser aprovechadas por un atacante local para provocar una denegaci&oacute;n de servicio.\n<\/p>\n<p><!--more--><\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\tLa primera vulnerabilidad, etiquetada con el c&oacute;digo&nbsp;<strong>CVE-2018-19406<\/strong>, se encuentra en la funci&oacute;n &lsquo;<em>kvm_pv_send_ipi<\/em>&lsquo; en el m&oacute;dulo &lsquo;<em>arch\/x86\/kvm\/lapic.c<\/em>&lsquo;. Un atacante podr&iacute;a provocar una situaci&oacute;n en la que no se inicialice &lsquo;<em>apic map&rsquo;<\/em>&nbsp;y provocar una denegaci&oacute;n de servicio a trav&eacute;s de llamadas al sistema especialmente manipuladas para provocar la desreferencia del puntero &lsquo;<em>kvm-&gt;arch.apic_map<\/em>&lsquo;.\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\tLa segunda vulnerabilidad, etiquetada con el c&oacute;digo&nbsp;<strong>CVE-2018-19407<\/strong>, reside en la funci&oacute;n &lsquo;<em>vcpu_scan_ioapic<\/em>&lsquo; del m&oacute;dulo &lsquo;<em>arch\/x86\/kvm\/x86.c<\/em>&lsquo; y se debe a una inicializaci&oacute;n incorrecta del controlador I\/O APIC (Advance Programmable Interrupt Controller). De forma similar a la anterior, un atacante local podr&iacute;a provocar una situaci&oacute;n en la que &lsquo;<em>ioapic<\/em>&lsquo; no se inicialice correctamente y provocar el DoS. Como se muestra en la siguiente prueba de concepto publicada por el investigador&nbsp;<a href=\"https:\/\/lkml.org\/lkml\/2018\/11\/20\/411\" rel=\"noopener\" target=\"_blank\">Wanpeng Li.<\/a>\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t<img loading=\"lazy\" decoding=\"async\" alt=\"\" class=\"aligncenter size-full wp-image-1074\" height=\"1378\" src=\"http:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2018\/11\/poc-linux-kernel-dos.png\" width=\"1332\" srcset=\"https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2018\/11\/poc-linux-kernel-dos.png 1666w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2018\/11\/poc-linux-kernel-dos-290x300.png 290w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2018\/11\/poc-linux-kernel-dos-768x794.png 768w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2018\/11\/poc-linux-kernel-dos-991x1024.png 991w\" sizes=\"auto, (max-width: 1332px) 100vw, 1332px\" \/>\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\tSe han publicado dos parches provisionales que solucionan ambas vulnerabilidades.\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t<strong>M&aacute;s informaci&oacute;n:<\/strong>\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\tKVM: LAPIC: Fix pv ipis use-before-initialization<br \/>\n\t<a href=\"https:\/\/lkml.org\/lkml\/2018\/11\/20\/411\" rel=\"noopener\" target=\"_blank\">https:\/\/lkml.org\/lkml\/2018\/11\/20\/411<\/a>\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\tKVM: X86: Fix scan ioapic use-before-initialization<br \/>\n\t<a href=\"https:\/\/lkml.org\/lkml\/2018\/11\/20\/580\" rel=\"noopener\" target=\"_blank\">https:\/\/lkml.org\/lkml\/2018\/11\/20\/580<\/a>\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\tTomado de Segurm&aacute;tica.<\/p>\n<h3>Im\u00e1genes Relacionadas:<\/h3>","protected":false},"excerpt":{"rendered":"<p>Las vulnerabilidades, de gravedad media, se deben a&nbsp;desreferencias a punteros nulos, y podr&iacute;an ser aprovechadas por un atacante local para provocar una denegaci&oacute;n de servicio. Im\u00e1genes Relacionadas:<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[2,6,14,15,45,24,40],"tags":[],"class_list":["post-1068","post","type-post","status-publish","format-standard","hentry","category-amenazas","category-codigos-malignos","category-incidentes","category-informaciones","category-linux","category-prevencion","category-vulnerabilidades"],"_links":{"self":[{"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/posts\/1068","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1068"}],"version-history":[{"count":2,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/posts\/1068\/revisions"}],"predecessor-version":[{"id":1086,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/posts\/1068\/revisions\/1086"}],"wp:attachment":[{"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1068"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1068"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1068"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}