All posts by admin

About CVE-2024-0127 and CVE-2024-0128 (24-10-2024)

Preface: GPUs are efficient at performing parallel processing tasks, making them ideal for artificial intelligence and machine learning applications. CPUs are better suited for tasks that require single-threaded performance or large amounts of memory access.

Background: NVIDIA vGPU software can be used in several ways. Guest VMs use NVIDIA vGPUs in the same manner as a physical GPU that has been passed through by the hypervisor: an NVIDIA driver loaded in the guest VM provides direct access to the GPU for performance-critical fast paths, and a paravirtualized interface to the NVIDIA Virtual GPU Manager is used for non-performant management operations.

Each NVIDIA vGPU is analogous to a conventional GPU, having a fixed amount of GPU framebuffer, and one or more virtual display outputs or “heads”. The vGPU’s framebuffer is allocated out of the physical GPU’s framebuffer at the time the vGPU is created, and the vGPU retains exclusive use of that framebuffer until it is destroyed.

All vGPUs resident on a physical GPU share access to the GPU’s engines including the graphics (3D), video decode, and video encode engines.

Vulnerability details:

CVE-2024-0127: NVIDIA vGPU software contains a vulnerability in the GPU kernel driver of the vGPU Manager for all supported hypervisors, where a user of the guest OS can cause an improper input validation by compromising the guest OS kernel. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, and information disclosure.

CVE-2024-0128: NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager that allows a user of the guest OS to access global resources. A successful exploit of this vulnerability might lead to information disclosure, data tampering, and escalation of privileges.

Official announcement: Please refer to the link for details – https://nvidia.custhelp.com/app/answers/detail/a_id/5586

CVE-2024-50311: A denial of service (DoS) vulnerability was found in OpenShift (23rd Oct 2024)

Preface: Typical REST APIs exhibit a few issues that we can solve with GraphQL. One of the most prominent is over fetching, which occurs when a client fetches too much data from the server. When OpenShift Console is fetching a lot of data, it leverages chunked responses introduced in k8s 1.9. Fetching is split into separate HTTP requests, which improves the responsiveness of the UI with results shown incrementally.

Background: GraphQL is a web service technology. It is a query language and server-side runtime for application programming interfaces (APIs) that gives API clients exactly the data they requested. As an alternative to REST, GraphQL allows developers to make requests to fetch data from multiple data sources with a single API call.

GraphQL technology is becoming the new standard for communication between front-end and back-end. Get started using GraphQL in OpenShift Console 4.6.

Vulnerability details: A denial of service (DoS) vulnerability was found in OpenShift. This flaw allows attackers to exploit the GraphQL batching functionality. The vulnerability arises when multiple queries can be sent within a single request, enabling an attacker to submit a request containing thousands of aliases in one query. This issue causes excessive resource consumption, leading to application unavailability for legitimate users.

Official announcement: Please refer to the link for details – https://nvd.nist.gov/vuln/detail/CVE-2024-50311

CVE-2024-49861: bpf (Fix helper writes to read-only maps) – 22 Oct 2024

Preface: BPF is a highly flexible and efficient virtual machine-like construct in the Linux kernel allowing to execute bytecode at various hook points in a safe manner. It is used in a number of Linux kernel subsystems, most prominently networking, tracing and security (e.g. sandboxing).

Background: BPF does not define itself by only providing its instruction set, but also by offering further infrastructure around it such as maps which act as efficient key / value stores, helper functions to interact with and leverage kernel functionality, tail calls for calling into other BPF programs, security hardening primitives, a pseudo file system for pinning objects (maps, programs), and infrastructure for allowing BPF to be offloaded, for example, to a network card.

Vulnerability details : This affects the check_func_arg function of the bpf component. Because of the manipulation with an unknown input value leads to a denial of service vulnerability.

In check_func_arg() when the argument is as mentioned, the meta->raw_mode is never set. Later, check_helper_mem_access(), under the case of PTR_TO_MAP_VALUE as register base type, it assumes BPF_READ for the subsequent call to check_map_access_type() and given the BPF map is read-only it succeeds.

The helpers really need to be annotated as ARG_PTR_TO_{LONG,INT} | MEM_UNINIT when results are written into them as opposed to read out of them. The latter indicates that it’s okay to pass a pointer to uninitialized memory as the memory is written to anyway.

Official announcement: Please refer to the link for details – https://nvd.nist.gov/vuln/detail/CVE-2024-49861

AMD’s response to the research paper that their technical details do not demonstrate any new security vulnerabilities in AMD prefetchers. (18 Oct 2024)

Preface: A hardware prefetcher is a data prefetching technique implemented as a hardware component in a processor, aimed at improving performance by fetching data before it is actually needed. Let’s take a closer look at prefetching. And speculate what kind of prefetching will approach this discussion.

Background: A research paper titled ‘ShadowLoad: Injecting State into Hardware Prefetchers’ was provided to AMD in February 2024. 

The paper discusses the possibility for prefetchers to be used to inject cache loads using a technique referred to as ”ShadowLoad”. The technique can potentially  expand the attack surface of existing attacks. 

Using a framework referred to as ”StrideRE” the researchers  automatically reverse engineer parameters required for hardware stride-prefetch attacks. The paper describes how this stride prefetcher can be used to leak offsets for stride patterns across contexts, possibly creating a covert channel. 

Official announcement: AMD has evaluated the paper and has determined that the researchers did not identify any AMD prefetchers that have not already been publicly disclosed in the referenced Software Optimization Guide and did not identify any new security implications with AMD prefetchers.

Official details: Please refer to the link for details – https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7023.html

VMware HCX resolves CVE-2024-38814 vulnerability (18-10-2024)

Preface: T-SQL is widely used in SQL Server environments. For instance, communication between an app and a SQL Server instance involves sending T-SQL statements to the server.

Background: VMware HCX streamlines migration, helps rebalance workloads, helps protect data, and optimizes disaster recovery processes for both on-premises data centers and cloud servers.

HCX Connector or Cloud Manager must be registered with vCenter server and NSX manager.
The registration is done through HCX 9443 Admin UI and only ONE vCenter & ONE NSX can be registered at any given time.

To access HCX Admin UI Page: https://<HCX_Manager_IP>:9443

Vulnerability details: An authenticated SQL injection vulnerability in VMware HCX was privately reported to VMware. A malicious authenticated user with non-administrator privileges may be able to enter specially crafted SQL queries and perform unauthorized remote code execution on the HCX manager. 

Official announcement: Please refer to the vendor announcement for details – https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25019

Through the patched CVE-2024-0132 fixing Docker vulnerability (CVE-2024-9348) 17th Oct 2024

Preface: When artificial intelligence gains enough intelligence, do you know what it will say if it knows that software or applications developed by humans have vulnerabilities? He would say “Fxxx”!

Background: Docker Engine is the fundamental containerization engine that runs on servers and manages containers, while Docker Desktop is a developer-focused tool that includes Docker Engine along with additional features to simplify the development and testing of containerized applications on local machines.

Can a Docker container have a desktop?
Overview of Docker Desktop – It provides a straightforward GUI (Graphical User Interface) that lets you manage your containers, applications, and images directly from your machine. Docker Desktop reduces the time spent on complex setups so you can focus on writing code.

Vulnerability details: Docker Desktop before v4.34.3 allows RCE via unsanitized GitHub source link in Build view.

Official announcement: Please refer to the vendor announcement for details – https://www.tenable.com/cve/CVE-2024-9348

CVE-2024-0129 – Path traversal issue discovered in NVIDIA NeMo (16-Oct-2024)

Preface: If successful, a path traversal attack may result in the following risks: Unauthorized data access: An attacker can gain access to sensitive files, such as configuration files, system files, or source code, which may include Credentials, application code and data, and sensitive operating system files.

Background: NVIDIA NeMo™ is an end-to-end platform for developing custom generative AI—including large language models (LLMs), multimodal, vision, and speech AI —anywhere. Deliver enterprise-ready models with precise data curation, cutting-edge customization, retrieval-augmented generation (RAG), and accelerated performance.

Standardized method to save a tarfile containing the checkpoint, config, and any additional artifacts. Implemented via nemo[.]core[.]connectors.

Vulnerability details: NVIDIA NeMo contains a vulnerability in SaveRestoreConnector where a user may cause a path traversal issue via an unsafe .tar file extraction. A successful exploit of this vulnerability may lead to code execution and data tampering.

Official announcement: Please refer to the link for details – https://nvidia.custhelp.com/app/answers/detail/a_id/5580

About AMD-SB-7025 and AMD-SB-3013: Technical research papers provided to AMD (15-Oct-2024)

Preface: Examples of side channel attacks include timing attacks, cache-based attacks, and network traffic analysis. Mitigating side channel attacks involves implementing secure coding practices, employing cryptographic algorithms resistant to side channels, and minimizing timing differences.

Background: Cache side channel attacks can infer the secret information processed by the victim by measuring the victim’s cache usage patterns. While the L1 and L2 caches are core-private, the LLC is shared between cores, so LLC-based attacks can be performed when the victim and attacker are not executing on the same core.

Security Focus:

AMD-SB-7025 – Researchers from Azure® Research, Microsoft® have provided to AMD a paper titled “Principled Microarchitectural Isolation on Cloud CPUs” in which they outline a method for potentially mitigating cache side-channel attacks.

Ref: https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7025.html

AMD-SB-3013 – Researchers from Graz University of Technology, Austria, have reported a way for a malicious hypervisor to monitor performance counters and potentially recover data from a guest VM.

Ref: https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3013.html

CVE-2024-45184: Design weakness found in Exynos, a system-on-chip based on Samsung’s ARM development (October 14, 2024)

Preface: USAT (USIM Application Toolkit) technology is based on the original passive operation mode of the SIM card and adds the new active operation capability of the SIM card, which allows applications and services in the SIM card to actively interact with mobile terminals.

Background: The USAT (USIM Application Toolkit) is a standardized set of commands and protocols that allow mobile applications to interact with the USIM card in 3G and 4G/LTE mobile networks.

USAT use case example:

Mobile Banking: Displays a secure PIN entry screen for transaction verification.

Mobile Payments: Interact with USIM cards for secure payment transactions, authorization and token generation.

Mobile messaging: Receive event notifications for incoming SMS messages or delivery reports.

Vulnerability details: An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Modems with chipset Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W920, W930, Modem 5123, and Modem 5300. A USAT out-of-bounds write due to a heap buffer overflow can lead to a Denial of Service.

Official announcement: Please refer to the link for details – https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-45184/

CVE-2024-47670: ocfs2 – add bounds checking (10-10-2024)

Preface: OCFS2 is a file system. It allows users to store and retrieve data. The data is stored in files that are organized in a hierarchical directory tree. It is a POSIX compliant file system that supports the standard interfaces and the behavioral semantics as spelled out by that specification.

Background: OCFS2 is a useful clustered file system that has many general purpose uses beyond Oracle workloads. Utilizing shared storage, it can be used for many general computing tasks where shared clustered storage is required.

OCFS2 supports 512-4K block size. In addition, there is support 4K-1M range for the Cluster size, which we can also call the allocation unit.

Vulnerability details: In the Linux kernel, the following vulnerability has been resolved: ocfs2: add bounds checking to ocfs2_xattr_find_entry() Add a paranoia check to make sure it doesn’t stray beyond valid memory region containing ocfs2 xattr entries when scanning for a match. It will prevent out-of-bound access in case of crafted images.

Official announcement: Please refer to the link for details –

https://www.tenable.com/cve/CVE-2024-47670