Bug 1292211 (CVE-2015-8556)

Summary: CVE-2015-8556 Qemu: virtfs: local privilege escalation via virtfs-proxy-helper
Product: [Other] Security Response Reporter: Prasad Pandit <ppandit>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: abaron, ailan, amit.shah, apevec, areis, berrange, cfergeau, chrisw, dallan, drjones, dwmw2, gkotton, imammedo, itamar, jen, jforbes, jschluet, knoel, lhh, lpeer, markmc, m.a.young, mkenneth, mrezanin, mst, pbonzini, rbryant, rjones, rkrcmar, sclewis, slong, srevivo, tdecacqu, virt-maint, virt-maint, vkuznets, xen-maint
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
A Time of Creation To Time of Usage (TOCTTOU) flaw was discovered in the QEMU emulator built with VirtFS(file system pass-through) support to share folders between host and guest. The flaw occurs if the 'virtfs-proxy-helper' program is installed with SUID permissions or has 'CAP_CHOWN' capability. An unprivileged, local attacker could exploit this flaw to potentially escalate their privileges and gain root access to the system.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-08 02:46:38 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1291751    

Description Prasad Pandit 2015-12-16 18:17:22 UTC
Qmeu emulator built with the VirtFS(file system pass-through) support to share
folders between host and guest is vulnerable to a Time of Creation To Time of
Usage(TOCTTOU) issue. This occurs if the 'virtfs-proxy-helper' program is
installed with SUID permissions OR has 'CAP_CHOWN' capability.

An unprivileged user could use this flaw to potentially escalate their privileges to gain root access on the system.

References:
-----------
  -> http://wiki.qemu.org/Documentation/9psetup
  -> http://www.openwall.com/lists/oss-security/2015/12/14/5
  -> https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=183dd7394703b49c7af441a

Comment 1 Prasad Pandit 2015-12-16 18:19:11 UTC
Statement: 

This issue does not affect the versions of the kvm and xen packages as shipped with Red Hat Enterprise Linux 5.

This issue does not affect the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 6, and the Red Hat Enterprise Linux 6 based versions of qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3.

This issue does not affect the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 7.

This issue does not affect the Red Hat Enterprise Linux 7 based versions of the qemu-kvm-rhev packages as shipped with Red Hat Enterprise Virtualization 3.