Bug 1602996 (CVE-2018-10906)
Summary: | CVE-2018-10906 fuse: bypass of the "user_allow_other" restriction when SELinux is active | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Sam Fowler <sfowler> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | abhgupta, bmcclain, dbaker, dblechte, dfediuck, eedri, jokerman, lemenkov, mgoldboi, michal.skrivanek, mszeredi, rschiron, sbonazzo, security-response-team, sherold, sthangav, tcallawa, trankin |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | fuse 2.9.8, fuse 3.2.5 | Doc Type: | If docs needed, set a value |
Doc Text: |
A vulnerability was discovered in fuse. When SELinux is active, fusermount is vulnerable to a restriction bypass. This allows non-root users to mount a FUSE file system with the 'allow_other' mount option regardless of whether 'user_allow_other' is set in the fuse configuration. An attacker may use this flaw to mount a FUSE file system, accessible by other users, and trick them into accessing files on that file system, possibly causing Denial of Service or other unspecified effects.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-06-10 10:33:27 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1605159, 1607854, 1607855 | ||
Bug Blocks: | 1602997 |
Description
Sam Fowler
2018-07-19 00:57:45 UTC
This flaw allows a local attacker to mount a FUSE file system with the 'allow_other' option, even if they should not be able to do so. As a consequence, if the attacker can trick other users to access his FUSE mount point, he can cause Denial of Services or other unspecified effects. Accesses to the FUSE mount point could be slowed down or delayed indefinitely. Moreover the FUSE file system could present files or directories of unlimited length, or directory structures of unlimited depth, thus causing DoS or other unspecified effects on other programs which do not consider this possibility. Patches: https://github.com/libfuse/libfuse/commit/28bdae3d113ef479c1660a581ef720cdc33bf466 https://github.com/libfuse/libfuse/commit/5018a0c016495155ee598b7e0167b43d5d902414 When checking whether allow_other/allow_root are allowed, fusermount lets users escape commas, even when the mount options do not permit backslashes. This allows a malicious user to hide options forbidden by fusermount. By using specially crafted values in the `context` mount option interpreted by SELinux, it is possible to use a backslash and smuggle the `allow_other` mount option. Flaw was introduced by https://github.com/libfuse/libfuse/commit/555d6b504308eac6b976321ce938ee4bec62c354. Created fuse tracking bugs for this issue: Affects: fedora-all [bug 1607854] Statement: This issue did not affect the versions of fuse as shipped with Red Hat Enterprise Linux 6 as they did not consider escaped characters when checking mount options. This issue is present in fuse packages included with Red Hat Virtualization, however it is not exploitable under any supported configuration. This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:3324 https://access.redhat.com/errata/RHSA-2018:3324 |