Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu,  4 Jun 2015 09:57:44 -0400 (EDT)
From: cve-assign@...re.org
To: ppandit@...hat.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request Linux kernel: ns: user namespaces panic

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

>> From: ebiederm@...ssion.com (Eric W. Biederman)
>> 
>> The core issue is that a unprivileged user could call umount(MNT_DETACH)
>> and in the right circumstances gain access to every file on essentially
>> any filesystem in the mount namespace.
>> 
>> e0c9c0afd2fc958ffa34b697972721d81df8a56f mnt: Update detach_mounts to leave mounts connected
>> is the real bug fix that fixes a fairly scary issue.

> From: P J P <ppandit@...hat.com>
> 
> Thank you so much for throwing light on the real issue and
> its corresponding fix.

As far as we can tell, the new information is extremely important but
the original CVE request remains valid as well.

Use CVE-2015-4176 for the issue fixed in
e0c9c0afd2fc958ffa34b697972721d81df8a56f. This code change is present
in 4.0.2.

Use CVE-2015-4177 for the issue fixed in
cd4a40174b71acd021877341684d8bb1dc8ea4ae. This code change is not
present in 4.0.2.

Use CVE-2015-4178 for the issue fixed in
820f9f147dcce2602eefd9b575bbbd9ea14f0953. This code change is not
present in 4.0.2.

Earlier messages in this thread suggest why
cd4a40174b71acd021877341684d8bb1dc8ea4ae and
820f9f147dcce2602eefd9b575bbbd9ea14f0953 can be treated as different
types of problems.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJVcFiAAAoJEKllVAevmvmsPdoIAIOhSovjCxHR7BbxfDPTjowL
x4RtY/SVcOVCYLOeM6ys68joTPB+ZPk9CkoShgWBphI895hwBPpIc8nHxk5GjZMq
PRekCMzaq3ODAbT9JDiEirbOf2YHQJ7PAq3on5ifBZuP7y+K/bXrrjPIfqceWsiM
19e/evfP5ilmFHyVgnU3k12+2Q/LrDttVownh+5dnTL0MnPnwQ5jJP4c0bU5TvG4
Ws3Gvc+vTheTvn6fNYP76ynn/UlNnJPY40DIPOBM4qdpSJjLYUwUZSqrzGHaKO13
DUa+X4AfLo/BR/nj4vuHz6uXrW99++tC1T2R1N8ai0ORlN9n5eiORiU+BdEiYco=
=JpSG
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ