Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 575122 - <sys-fs/aufs{3,4}-*_pre20160219 =sys-kernel/aufs-sources-{3.18.25-r1,4.0.4,4.0.9,4.1.12,4.1.15-r1,4.1.16,4.1.17,4.3.3-r1,4.3.4,4.3.5,4.4.0-r1,4.4.1} FUSE + ACL related vulnerability (CVE-2016-{2853,2854})
Summary: <sys-fs/aufs{3,4}-*_pre20160219 =sys-kernel/aufs-sources-{3.18.25-r1,4.0.4,4....
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard: ~1 [noglsa cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2016-02-19 07:42 UTC by Justin Lecher (RETIRED)
Modified: 2016-11-11 07:48 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Justin Lecher (RETIRED) gentoo-dev 2016-02-19 07:42:41 UTC
ChangeLog:

o security bugfix
- test mnt_ns in open(2) for fuse branch, reported by halfdog.
- copy-up resets ACL, reported by halfdog.

VCS:

commit d783b9a5cff6fa2fedc80cfe781d40cd05fb09c4
Author: J. R. Okajima <hooanon05g@gmail.com>
Date:   Tue Feb 16 04:28:09 2016 +0900

    aufs: security bugfix, copy-up resets ACL

    In ACL world, a dir can have its "default ACL" which will be applied to
    all future children. It means that the copied-up entry will have its
    original ACL (set on the lower RO branch) plus the parent dir's default
    one (set on the upper RW branch). This mixture may cause a security
    problem, and this commit resets all ACL in copy-up, which will prevent
    inheriting the ACL from its parent dir.

    Reported-by: halfdog <me@halfdog.net>
    Signed-off-by: J. R. Okajima <hooanon05g@gmail.com>

@security, please fix the subject that it fits better.
Comment 1 Justin Lecher (RETIRED) gentoo-dev 2016-02-19 07:47:08 UTC
VCS:

   aufs: security bugfix, test mnt_ns in open(2) for fuse branch

    Under a special condition, an executable on a malicous FUSE branch could
    escalate its privilege via aufs. In order to prevent this, here adds a
    test about mnt_ns into open(2) for FUSE branch only.

    (How can I describe the security detail before the issue will be opened
    on the coordinated release date (CRD)?)

    Reported-by: halfdog <me@halfdog.net>
    Signed-off-by: J. R. Okajima <hooanon05g@gmail.com>
Comment 2 Justin Lecher (RETIRED) gentoo-dev 2016-02-19 08:48:59 UTC
commit c00d69f9133ba7cccdd27b70a9d7b817178f09e7
Author: Justin Lecher <jlec@gentoo.org>
Date:   Fri Feb 19 09:48:01 2016 +0100

    sys-kernel/aufs-sources: Bump to latest aufs, genpatches and linux release

    * Drop vulnerable versions

    Gentoo-Bug: https://bugs.gentoo.org/show_bug.cgi?id=575122

    Package-Manager: portage-2.2.27
    Signed-off-by: Justin Lecher <jlec@gentoo.org>

    https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=c00d69f9133ba7cccdd27b70a9d7b817178f09e7


commit 37b6efdafc262d8f17f97fc4f3c96fe08fff0326
Author: Justin Lecher <jlec@gentoo.org>
Date:   Fri Feb 19 09:08:51 2016 +0100

    sys-fs/aufs4: Bump to latest aufs release

    * Bump to EAPI=6
    * Bump to nextgen readme.gentoo eclass
    * Try to break lines at 80 chars

    Package-Manager: portage-2.2.27
    Signed-off-by: Justin Lecher <jlec@gentoo.org>

    https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=37b6efdafc262d8f17f97fc4f3c96fe08fff0326

commit fc3670df2edeeca5e7958313230fe40e5580f630
Author: Justin Lecher <jlec@gentoo.org>
Date:   Fri Feb 19 08:56:16 2016 +0100

    sys-fs/aufs4: Drop old

    Package-Manager: portage-2.2.27
    Signed-off-by: Justin Lecher <jlec@gentoo.org>

    https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=fc3670df2edeeca5e7958313230fe40e5580f630

commit acdb79aa45f78d7d2fe9592d7d352bdf59c2ac3e
Author: Justin Lecher <jlec@gentoo.org>
Date:   Fri Feb 19 08:53:51 2016 +0100

    sys-fs/aufs3: Bump to latest aufs release

    * Bump to EAPI=6
    * Try to wrap lines at 80 chars

    Package-Manager: portage-2.2.27
    Signed-off-by: Justin Lecher <jlec@gentoo.org>

    https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=acdb79aa45f78d7d2fe9592d7d352bdf59c2ac3e

commit f73da9da310d0422eb866464d413b5e02e97a7df
Author: Justin Lecher <jlec@gentoo.org>
Date:   Fri Feb 19 08:48:10 2016 +0100

    sys-fs/aufs3: Drop old

    Package-Manager: portage-2.2.27
    Signed-off-by: Justin Lecher <jlec@gentoo.org>

    https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=f73da9da310d0422eb866464d413b5e02e97a7df
Comment 3 Justin Lecher (RETIRED) gentoo-dev 2016-02-19 08:49:25 UTC
@arches, please stabilize

sys-fs/aufs3-3_p20160219
Comment 4 Agostino Sarubbo gentoo-dev 2016-03-02 14:23:02 UTC
amd64 stable
Comment 5 Agostino Sarubbo gentoo-dev 2016-03-15 16:39:32 UTC
x86 stable.

Maintainer(s), please cleanup.
Comment 6 Justin Lecher (RETIRED) gentoo-dev 2016-07-02 18:36:07 UTC
commit ac28ea95507c55d0409097fc9347fa7dc2850776
Author: Justin Lecher <jlec@gentoo.org>
Date:   Sat Jul 2 18:30:13 2016 +0000

    sys-fs/aufs3: Drop vulnerable version

    Gentoo-Bug: https://bugs.gentoo.org/show_bug.cgi?id=575122

    Package-Manager: portage-2.3.0
    Signed-off-by: Justin Lecher <jlec@gentoo.org>

    https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=ac28ea95507c55d0409097fc9347fa7dc2850776
Comment 7 GLSAMaker/CVETool Bot gentoo-dev 2016-07-03 05:58:09 UTC
CVE-2016-2854 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2854):
  The aufs module for the Linux kernel 3.x and 4.x does not properly maintain
  POSIX ACL xattr data, which allows local users to gain privileges by
  leveraging a group-writable setgid directory.

CVE-2016-2853 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2853):
  The aufs module for the Linux kernel 3.x and 4.x does not properly restrict
  the mount namespace, which allows local users to gain privileges by mounting
  an aufs filesystem on top of a FUSE filesystem, and then executing a crafted
  setuid program.
Comment 8 Aaron Bauman (RETIRED) gentoo-dev 2016-07-03 06:04:53 UTC
I marked the overall bug unstable.  sys-fs/aufs3 will require a GLSA considering it is stable.  Thanks for all of the work, Justin.

New GLSA Request filed for sys-fs/aufs3 only.
Comment 9 Aaron Bauman (RETIRED) gentoo-dev 2016-11-11 07:48:04 UTC
This was the first stable request for this package.  As such, all previous versions are not supported by security.  Apologize for the confusion.  Closing.