Re: apptainer 1.1.8-1 has an incompatible change for apptainer-suid users

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, Apr 27, 2023 at 12:00:47PM +0100, David Trudgian wrote:
> On Thu, Apr 27, 2023, at 8:11 AM, Carl George wrote:
> > The Red Hat CVSS score for CVE-2022-1184 has the same breakdown as the
> > NVD CVSS score.  Both rate the "privileges required" property as low.
> > From what I can tell that property would be rated high if they
> > considered root privileges to be required.  How does apptainer's use
> > of setuid change anything here?
> 
> My read of privileges required 'low' on CVE-2022-1184 is that perhaps
> it is related to the situation where, although a direct `mount`
> command against an extfs filesystem usually requires root, it is
> common that a non-root user can initiate mounts of extfs USB drives
> etc in 'standard' distro configurations via udisks2. I could be way
> off here, but at least on desktop systems there's usually a way for a
> non-root user to mount extfs removable drives.

It's possible that's what they meant, but as the already referenced
article https://lwn.net/Articles/652468/ makes clear, security experts
do not worry about that case because it requires physical access to 
the machine.  That's another type of privilege, and there are countless
ways for such a user to get root access.

> With respect to CVE-2023-30549 scoring, we're going to have quite a
> bit of confusion arising from the fact that the CNA suggested score at
> the NVD listing is different than on the GitHub GHSA page...
>
> On https://nvd.nist.gov/vuln/detail/CVE-2023-30549  the CNA provided
> vector is CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H 
>
> This results in a higher score than CVE-2022-1184 because it lists
> 'Privileges Required: None' .... which is surely incorrect, as you
> have to have a user account with enough privileges to run apptainer?

That's odd. It only makes a .1 diference in any case, and doesn't change
the high severity rating.

> On https://github.com/apptainer/apptainer/security/advisories/GHSA-j4rf-7357-f4cg
> the vector is CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
> 
> So... at the GHSA page, the Privleges Required is low (which seems
> correct), but compared to CVE-2022-1184:
> 
> 1) attack complexity is now high... which seems odd to change.

I think that was because they had a low complexity way to cause denial
of service.  It's high complexity to do privilege escalation.  The ext4
kernel developer was confident that a kernel security expert could cause
any use-after-free vulnerability into a privilege escalation, and that's
why I set this to be high complexity.

> 2) the suggested scoring has bumped Confidentiality and Integrity
> impact to 'high', where they are both 'none' in the underlying
> CVE-2022-1184. Not clear how this can be correct when CVE-2022-1184 is
> a denial of service vuln.

That's because of the potential privilege escalation.  I based the
individual property settings on CVE-2023-0386 which was a low complexity
privilege escalation.  Red Hat rated that high complexity, which I think
was another mistake because I was able to easily reproduce the exploit
on a pre-patched kernel.

> I'm quite confused looking at this now. I don't know how the GitHub
> submited CNA suggest score at the NVD would differ from the score on
> the GitHub Security Advisory. Was the scoring on the GHSA edited after
> publication, after it had been sent to the NVD?

Oh, you're on to something. I did change those settings after the
initial creation, after I learned about CVE-2023-0386, but it was before
publication.  I don't know how to get that corrected, but I will try.

> Also, I don't know what the justification is on the GHSA for bumping
> confidentiality / integrity impact, nor changing complexity from low
> -> high versus CVE-2022-1184.

Explained above.

Dave
_______________________________________________
epel-devel mailing list -- epel-devel@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to epel-devel-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/epel-devel@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue




[Index of Archives]     [Fedora Announce]     [Fedora News]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Maintainers]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Legacy]     [Fedora Desktop]     [Fedora Fonts]     [ATA RAID]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [Fedora Package Announce]     [SSH]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Centos]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora QA]     [Fedora Triage]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Tux]     [Yosemite News]     [Linux Apps]     [Gnome Users]     [KDE Users]     [Fedora Tools]     [Fedora Art]     [Fedora Docs]     [Maemo Users]     [Asterisk PBX]     [Fedora Sparc]     [Fedora Universal Network Connector]     [Fedora ARM]

  Powered by Linux