Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 05 Jun 2015 12:31:23 -0500
From: ebiederm@...ssion.com (Eric W. Biederman)
To: P J P <ppandit@...hat.com>
Cc: oss security list <oss-security@...ts.openwall.com>,  cve-assign@...re.org
Subject: Re: Re: CVE request Linux kernel: ns: user namespaces panic

P J P <ppandit@...hat.com> writes:

> +-- On Thu, 4 Jun 2015, cve-assign@...re.org wrote --+
> | >> From: ebiederm@...ssion.com (Eric W. Biederman)
> | >> 
> | >> The core issue is that a unprivileged user could call umount(MNT_DETACH)
> | >> and in the right circumstances gain access to every file on essentially
> | >> any filesystem in the mount namespace.
> | >> 
> | >> e0c9c0afd2fc958ffa34b697972721d81df8a56f mnt: Update detach_mounts to leave mounts connected
> | >> is the real bug fix that fixes a fairly scary issue.
> | >>
> | >> So I believe cd4a40174b71acd021877341684d8bb1dc8ea4ae prevents a
> | >> difficult to trigger crash if you have
> | >> e0c9c0afd2fc958ffa34b697972721d81df8a56f applied.
> | >>
> |
> | Use CVE-2015-4176 for the issue fixed in
> | e0c9c0afd2fc958ffa34b697972721d81df8a56f . This code change is present
> | in 4.0.2.
> | 
> | Use CVE-2015-4177 for the issue fixed in
> | cd4a40174b71acd021877341684d8bb1dc8ea4ae. This code change is not
> | present in 4.0.2.
>
>   Ie IIUC, existence of CVE-2015-4177 depends on CVE-2015-4176 being fixed, 
> which in turn depends on commit
>
>   -> https://git.kernel.org/linus/ce07d891a0891d3c0d0c2d73d577490486b809e1
>
> being present. (...Eric?)

There are no dependencies between
e0c9c0afd2fc958ffa34b697972721d81df8a56f and
cd4a40174b71acd021877341684d8bb1dc8ea4ae

Neither commit (cec9c... or cd4a4017...) missing is a problem unless
ce07d891a0891d3c0d0c2d73d577490486b809e1 is present.

Commits (cec9c... and cd4a4017...) are harmless on their own.

I hope that clarifies things.

Eric

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ