Bug 1291329 (CVE-2015-8660)

Summary: CVE-2015-8660 kernel: Permission bypass on overlayfs during copy_up
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: agordeev, aquini, arm-mgr, bhu, carnil, cmaiolin, dhoward, esammons, fhrbata, gansalmon, iboverma, itamar, jforbes, jiaoyang, jkacur, joelsmith, jonathan, jross, jwboyer, kernel-maint, kernel-mgr, kstutsma, lgoncalv, lwang, madhu.chinakonda, matt, mchehab, mcressma, mguzik, mrg-program-list, nath.e.will, nmurray, pholasek, plougher, pmatouse, ppandit, rik.theys, rvrbovsk, slawomir, vdronov, williams
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel through 4.3.3 attempts to merge distinct setattr operations, which allows local users to bypass intended access restrictions and modify the attributes of arbitrary overlay files via a crafted application.
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-08-23 19:07:27 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1291332, 1293980, 1293981, 1306358, 1324858, 1324859, 1350846    
Bug Blocks: 1291331    

Description Adam Mariš 2015-12-14 15:07:46 UTC
A security issue was fixed in kernel 4.4-rc4 resolving the bypassing of filesystem permission checks in overlayfs during the initial copy_up.

Upstream patch:

https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=acff81ec2c79492b180fade3c2894425cd35a545

Comment 2 Adam Mariš 2015-12-14 15:13:29 UTC
Acknowledgements:

Name: Nathan Williams

Comment 3 Adam Mariš 2015-12-14 15:17:55 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1291332]

Comment 4 Fedora Update System 2015-12-22 07:20:16 UTC
kernel-4.2.8-200.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.

Comment 5 Fedora Update System 2015-12-22 22:01:29 UTC
kernel-4.2.8-300.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.

Comment 7 Vladis Dronov 2015-12-23 21:49:11 UTC
Statement:

This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6 as the code with the flaw is not present in the products listed.

This issue does not affect the Linux kernel packages as shipped with Red Hat
Enterprise Linux 7 and Red Hat Enterprise MRG 2 as the due updates to fix
this issue have been shipped now.

Comment 8 Huzaifa S. Sidhpurwala 2015-12-28 09:18:14 UTC
This issue was assigned CVE-2015-8660 as per:

http://seclists.org/oss-sec/2015/q4/575

Comment 17 errata-xmlrpc 2016-08-02 13:53:38 UTC
This issue has been addressed in the following products:

  MRG for RHEL-6 v.2

Via RHSA-2016:1532 https://rhn.redhat.com/errata/RHSA-2016-1532.html

Comment 18 errata-xmlrpc 2016-08-02 18:26:22 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2016:1539 https://rhn.redhat.com/errata/RHSA-2016-1539.html

Comment 19 errata-xmlrpc 2016-08-02 18:35:55 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2016:1541 https://rhn.redhat.com/errata/RHSA-2016-1541.html