← Back to team overview

kernel-packages team mailing list archive

[Bug 1547400] Re: aufs fails to handle sanitize xattrs in workdir, copies SUID binaries from no-suid fuse mounts

 

Note that the severity of this issue is lower than the similar issue
that was discovered in overlayfs since the aufs module has to be loaded
with the 'allow_userns' parameter.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1547400

Title:
  aufs fails to handle sanitize xattrs in workdir, copies SUID binaries
  from no-suid fuse mounts

Status in Linux:
  Confirmed
Status in linux package in Ubuntu:
  Confirmed

Bug description:
  When aufs module is loaded with "modprobe aufs allow_userns",
  unprivileged user can use xattrs on the working directory or aufs
  mount over a fuse mount to create SUID/SGID binaries, thus escalating
  privileges. These errors are quite similar to those on overlayfs:

  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1535150
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1534961

  aufs developers have already confirmed and issued a fix:

  https://sourceforge.net/p/aufs/mailman/message/34864744/

  Specific reproducers can be found at:

  http://www.halfdog.net/Security/2016/AufsPrivilegeEscalationInUserNamespaces/
  InvitedOnly AkgY8iqF

  # lsb_release -rd
  Description:    Ubuntu 15.10
  Release:        15.10

  # apt-cache policy linux-image-4.2.0-27-generic
  linux-image-4.2.0-27-generic:
    Installed: 4.2.0-27.32
    Candidate: 4.2.0-27.32
    Version table:
   *** 4.2.0-27.32 0
          500 http://archive.ubuntu.com/ubuntu/ wily-updates/main amd64 Packages
          500 http://archive.ubuntu.com/ubuntu/ wily-security/main amd64 Packages
          100 /var/lib/dpkg/status

To manage notifications about this bug go to:
https://bugs.launchpad.net/linux/+bug/1547400/+subscriptions