Bug 1362545 (CVE-2016-5425)
| Summary: | CVE-2016-5425 tomcat: Local privilege escalation via systemd-tmpfiles service | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Adam Mariš <amaris> |
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
| Status: | CLOSED ERRATA | QA Contact: | |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | unspecified | CC: | aileenc, asantos, asoldano, aszczucz, bbaranow, bdawidow, bmaxwell, brian.stansberry, ccoleman, cdewolf, chazlett, csutherl, dandread, darran.lofthouse, dedgar, dkreling, dmcphers, dosoudil, felias, fjuma, fnasser, gmalinko, gvarsami, hfnukal, hhorak, istudens, ivassile, iweiss, janstey, jason.greene, jawilson, jclere, jcoleman, jdoyle, jgoulding, jialiu, joelsmith, jokerman, jolee, jorton, jpallich, jschatte, jshepherd, jstastny, kanderso, kconner, ldimaggi, lgao, lmeyer, loleary, mbabacek, mbaluch, miburman, mizdebsk, mmccomas, mnewsome, mosmerov, mschmidt, msochure, msvehla, mweiler, myarboro, netwiz, nobody+bgollahe, nwallace, ohudlick, pavelp, pesilva, pgier, pjindal, plodge, pmackay, psakar, pslavice, rnetuka, rstancel, rstepani, rsvoboda, rwagner, rzima, security-response-team, smaestri, spinder, szappis, tcunning, theute, tkirby, tom.jenkinson, ttarrant, twalsh, vhalbert, vtunka, weli |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: |
It was discovered that the Tomcat packages installed configuration file /usr/lib/tmpfiles.d/tomcat.conf writeable to the tomcat group. A member of the group or a malicious web application deployed on Tomcat could use this flaw to escalate their privileges.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2016-10-10 20:44:16 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 1362567, 1362568, 1383210 | ||
| Bug Blocks: | 1362547 | ||
|
Description
Adam Mariš
2016-08-02 13:16:44 UTC
Acknowledgments: Name: Dawid Golunski (http://legalhackers.com) Created tomcat tracking bugs for this issue: Affects: fedora-all [bug 1383210] Public via: http://seclists.org/oss-sec/2016/q4/78 Out of interest, would SELinux policy prevent the tomcat user from writing to this file anyway? I'm afraid it won't. Query the SELinux policy:
$ sesearch --allow -s tomcat_t -t lib_t -c file -p write
Found 1 semantic av rules:
allow files_unconfined_type file_type : file { [...] write [...] } ;
It appears tomcat_t has the files_unconfined_type attribute, which means the SELinux policy puts very little restrictions on it.
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:2046 https://rhn.redhat.com/errata/RHSA-2016-2046.html |