Bug 500297 (CVE-2009-1630)
Summary: | CVE-2009-1630 kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission | ||||||
---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Eugene Teo (Security Response) <eteo> | ||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
Status: | CLOSED ERRATA | QA Contact: | |||||
Severity: | medium | Docs Contact: | |||||
Priority: | medium | ||||||
Version: | unspecified | CC: | atangrin, bhu, dhoward, dpal, ejratl, jjarvis, jlieskov, lgoncalv, nmurray, rkhan, sgrubb, steved, tao, vgaikwad, vgoyal, williams | ||||
Target Milestone: | --- | Keywords: | Security | ||||
Target Release: | --- | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2021-10-19 09:06:54 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | 500298, 500299, 500300, 500301, 500302 | ||||||
Bug Blocks: | |||||||
Attachments: |
|
Description
Eugene Teo (Security Response)
2009-05-12 07:07:07 UTC
This looks like the same problem that was reported in November 2006: http://linux-nfs.org/pipermail/nfsv4/2006-November/005323.html http://linux-nfs.org/pipermail/nfsv4/2006-November/005313.html http://bugzilla.linux-nfs.org/show_bug.cgi?id=131 CVE-2009-1630: The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver. References: http://article.gmane.org/gmane.linux.nfs/26592 http://linux-nfs.org/pipermail/nfsv4/2006-November/005313.html http://linux-nfs.org/pipermail/nfsv4/2006-November/005323.html http://bugzilla.linux-nfs.org/show_bug.cgi?id=131 http://www.securityfocus.com/bid/34934 Created attachment 344739 [details] Upstream patch http://git.kernel.org/linus/7ee2cb7f32b299c2b06a31fde155457203e4b7dd Add issue 296766. This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2009:1106 https://rhn.redhat.com/errata/RHSA-2009-1106.html This issue has been addressed in following products: Red Hat Enterprise Linux 4 Via RHSA-2009:1132 https://rhn.redhat.com/errata/RHSA-2009-1132.html This issue has been addressed in following products: MRG for RHEL-5 Via RHSA-2009:1157 https://rhn.redhat.com/errata/RHSA-2009-1157.html |