Bug 1706826 (CVE-2017-18367)
| Summary: | CVE-2017-18367 libseccomp-golang: mishandling of multiple argument rules leading to a bypass of intended access restrictions | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Marian Rehak <mrehak> |
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
| Status: | CLOSED ERRATA | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | CC: | ahardin, aos-bugs, bleanhar, bmontgom, ccoleman, dedgar, eparis, go-sig, jburrell, jchaloup, jgoulding, jokerman, maszulik, mchappel, mfojtik, nstielau, sponnaga, sttts |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | libseccomp-golang 0.9.1 | Doc Type: | If docs needed, set a value |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2019-12-17 08:09:24 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 1706828, 1706829, 1728130, 1728131, 1779016, 1779017, 1779018, 1779019, 1779020 | ||
| Bug Blocks: | 1706830 | ||
|
Description
Marian Rehak
2019-05-06 11:11:22 UTC
Created golang-github-seccomp-libseccomp-golang tracking bugs for this issue: Affects: epel-6 [bug 1706829] Affects: fedora-all [bug 1706828] This issue affects This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.1 Via RHSA-2019:4087 https://access.redhat.com/errata/RHSA-2019:4087 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.1 Via RHSA-2019:4090 https://access.redhat.com/errata/RHSA-2019:4090 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2017-18367 Statement:
This issue may affect OpenShift Container Platform 3.x and 4.x if you are providing a custom Seccomp profile using Security Context Constraints [1]. The custom Seccomp profile would need to specify multiple arguments, such as below, from [2].
{
"names": [
"socketcall"
],
"action": "SCMP_ACT_ALLOW",
"args": [
{
"index": 0,
"value": 1,
"valueTwo": 0,
"op": "SCMP_CMP_EQ"
},
{
"index": 1,
"value": 1,
"valueTwo": 0,
"op": "SCMP_CMP_EQ"
}
],
"comment": "",
"includes": {},
"excludes": {}
},
If such a profile was used the arguments could be combined as an OR rule, not AND, as the user might expect from Seccomp.
[1] https://docs.openshift.com/container-platform/4.1/authentication/managing-security-context-constraints.html
[2] https://github.com/moby/moby/issues/32714#issuecomment-295532163
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 3.11 Via RHSA-2020:2479 https://access.redhat.com/errata/RHSA-2020:2479 |