Re: [PATCH] policycoreutils: preserve mode bits and ownership of /tmp in seunshare

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello Dave, thanks for the explanation

On Thu, 2011-09-15 at 17:07 -0400, dave w wrote:
> On Thu, Sep 15, 2011 at 4:07 PM, Guido Trentalancia
> <guido@xxxxxxxxxxxxxxxx> wrote:
> > Hello Dave.
> >
> > On Thu, 2011-09-15 at 13:39 -0400, dave w wrote:
> >> Hi,
> >>
> >> This patch addresses a flaw in seunshare.c that allows unprivileged
> >> users to arbitrarily modify the contents of /tmp.  This bug is further
> >> described in CVE 2011-1011
> >> (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1011):
> >
> > seunshare should not be installed by default and, even if it still
> > needed to be installed by default, its setuid bit should be carefully
> > re-evaluated in my opinion.
> >
> 
> Perhaps, but distros that install seunshare at present will be made
> safer with the addition of a patch which eliminates an attack vector
> to a privilege escalation.

So the question now is: CVE-2011-1011 is dated 20110214, how comes this
is trying to get sorted out only now for upstream ?

> > In any case, good practice says nothing should ever be allowed to mount
> > under /tmp with suid/exec flags (use noexec,nosuid options in fstab).
> >
> > That said, have you tested the patch already ? Is it effective ?
> >
> 
> Yes, the patch has been effective and with it applied, unprivileged
> users cannot delete files other than their own from /tmp, which is the
> expected behavior in a directory with the sticky bit set owned by the
> superuser.
> 
> > Thanks.
> >
> > Guido
> >
> >> The seunshare_mount function in sandbox/seunshare.c in seunshare in certain
> >> Red Hat packages of policycoreutils 2.0.83 and earlier in Red Hat
> >> Enterprise Linux (RHEL) 6 and earlier, and Fedora 14 and earlier, mounts a
> >> new directory on top of /tmp without assigning root ownership and the
> >> sticky bit to this new directory, which allows local users to replace or
> >> delete arbitrary /tmp files, and consequently cause a denial of service or
> >> possibly gain privileges, by running a setuid application that relies on
> >> /tmp, as demonstrated by the ksu application

What happened exactly for upstream since the CVE was initially
released ?

> >> This patch preserves the mode bits, and thus permissions, and
> >> ownership of the destination directory of the bind mount performed by
> >> seunshare.  The permission check in verify_mount() was relaxed for
> >> directories who originally had the sticky bit set, as root ownership
> >> is required for these to ensure that unprivileged users cannot unlink
> >> arbitrary files in the newly bind mounted directory.

Is it the first time ever that you post a patch to try sorting out the
same issue ?

> >> Thanks,
> >> David

Thanks, Guido.


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.


[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux