Bug 2068171 (CVE-2022-1117)

Summary: CVE-2022-1117 fapolicyd: fapolicyd wrongly prepares ld.so path
Product: [Other] Security Response Reporter: Pedro Sampaio <psampaio>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: dapospis, rsroka, security-response-team, sgrubb
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in fapolicyd. The vulnerability occurs due to an assumption on how glibc names the runtime linker, a build time regular expression may not correctly detect the runtime linker. The consequence is that the pattern detection for applications launched by the run time linker may fail to detect the pattern and allow execution.
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-05-11 18:15:19 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2069119, 2069120, 2069121, 2069122, 2069123, 2084586, 2089692    
Bug Blocks: 2068175, 2069211    

Description Pedro Sampaio 2022-03-24 14:58:31 UTC
As a consequence of wrong dynamic preparation during the build time the fapolicyd service allows to execute any arbitrary code by unprivileged user if executed via the dynamic linker.

References:

https://bugzilla.redhat.com/show_bug.cgi?id=2066904

Comment 5 errata-xmlrpc 2022-05-10 14:12:43 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:1898 https://access.redhat.com/errata/RHSA-2022:1898

Comment 6 Product Security DevOps Team 2022-05-11 18:15:17 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-1117

Comment 8 Mauro Matteo Cascella 2022-05-24 09:12:51 UTC
Created fapolicyd tracking bugs for this issue:

Affects: fedora-all [bug 2089692]

Comment 9 errata-xmlrpc 2022-05-31 12:19:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Extended Update Support

Via RHSA-2022:4824 https://access.redhat.com/errata/RHSA-2022:4824