Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 21 May 2009 19:37:53 -0400 (EDT)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: oss-security@...ts.openwall.com
cc: "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE request: kernel: problem with NFS v4 client
 handling of MAY_EXEC in nfs_permission


On Wed, 13 May 2009, Eugene Teo wrote:

> Frank Filz reported: the problem is that permission checking is skipped
> if atomic open is possible, but when exec opens a file, it just opens it
> O_READONLY which means EXEC permission will not be checked at that time.

======================================================
Name: CVE-2009-1630
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1630
Reference: MLIST:[linux-nfs] 20090509 [NFS] [PATCH] nfs: Fix NFS v4 client handling of MAY_EXEC in nfs_permission.
Reference: URL:http://article.gmane.org/gmane.linux.nfs/26592
Reference: MLIST:[nfsv4] 20061116 Status of execute permissions in NFSv4 ACLs ?
Reference: URL:http://linux-nfs.org/pipermail/nfsv4/2006-November/005313.html
Reference: MLIST:[nfsv4] 20061117 [Patch] Re: Status of execute permissions in NFSv4 ACLs ?
Reference: URL:http://linux-nfs.org/pipermail/nfsv4/2006-November/005323.html
Reference: MLIST:[oss-security] 20090513 CVE request: kernel: problem with NFS v4 client handling of MAY_EXEC in nfs_permission
Reference: URL:http://www.openwall.com/lists/oss-security/2009/05/13/2
Reference: CONFIRM:http://bugzilla.linux-nfs.org/show_bug.cgi?id=131
Reference: CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=500297
Reference: BID:34934
Reference: URL:http://www.securityfocus.com/bid/34934

The nfs_permission function in fs/nfs/dir.c in the NFS client
implementation in the Linux kernel 2.6.29.3 and earlier, when
atomic_open is available, does not check execute (aka EXEC or
MAY_EXEC) permission bits, which allows local users to bypass
permissions and execute files, as demonstrated by files on an NFSv4
fileserver.


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.