Message ID | CAODzB9pMmbJugyNLdvOOifW1Tm+1NhnsUi+zQBdRaj3Z=aC+fw@mail.gmail.com (mailing list archive) |
---|---|
State | New |
Headers | show |
Series | New CVE entry this week | expand |
Hi, > -----Original Message----- > From: cip-dev@lists.cip-project.org [mailto:cip-dev@lists.cip-project.org] On Behalf Of Masami Ichikawa > Sent: Thursday, October 21, 2021 10:21 AM > To: cip-dev <cip-dev@lists.cip-project.org> > Subject: [cip-dev] New CVE entry this week > > Hi ! > > It's this week's CVE report. > > This week reported 7 new CVEs. > > * New CVEs > > CVE-2021-20320: kernel: s390 eBPF JIT miscompilation issues fixes. > > This bug is in BPF subsystem and s390 architecture specific. Patches > haven't been backported to 4.4 kernel. However, according to the > cip-kernel-config, it looks like no one uses s390, so can it ignore it > until someone backport patches? > > CVSS v3 score is not provided. > > Fixed status > > mainline: [db7bee653859ef7179be933e7d1384644f795f26, > 6e61dc9da0b7a0d91d57c2e20b5ea4fd2d4e7e53, > 1511df6f5e9ef32826f20db2ee81f8527154dc14] > stable/4.19: [ddf58efd05b5d16d86ea4638675e8bd397320930] > stable/4.9: [c22cf38428cb910f1996839c917e9238d2e44d4b, > 8a09222a512bf7b32e55bb89a033e08522798299] > stable/5.10: [d92d3a9c2b6541f29f800fc2bd44620578b8f8a6, > 4320c222c2ffe778a8aff5b8bc4ac33af6d54eba, > ab7cf225016159bc2c3590be6fa12965565d903b] > stable/5.14: [7a31ec4d215a800b504de74b248795f8be666f8e, > 6a8787093b04057d855822094d63d04a2506444a, > a7593244dc31ad0eea70319f6110975f9c738dca] > > CVE-2021-20321: kernel: In Overlayfs missing a check for a negative > dentry before calling vfs_rename() > > CVSS v3 score is not provided. > > A local attacker can escalate their privileges up to root via > overlayfs vulnerability. > Patch for 4.4 is applied > failed(https://lore.kernel.org/stable/163378772914820@kroah.com/). It > needs to modify the patch. I attached a patch, if it looks good, I'll > send it to the stable mailing list. Thanks, I checked your patch. LGTM. Best regards, Nobuhiro
Hi ! On Thu, Oct 21, 2021 at 5:42 PM Nobuhiro Iwamatsu <nobuhiro1.iwamatsu@toshiba.co.jp> wrote: > > Hi, > > > -----Original Message----- > > From: cip-dev@lists.cip-project.org [mailto:cip-dev@lists.cip-project.org] On Behalf Of Masami Ichikawa > > Sent: Thursday, October 21, 2021 10:21 AM > > To: cip-dev <cip-dev@lists.cip-project.org> > > Subject: [cip-dev] New CVE entry this week > > > > Hi ! > > > > It's this week's CVE report. > > > > This week reported 7 new CVEs. > > > > * New CVEs > > > > CVE-2021-20320: kernel: s390 eBPF JIT miscompilation issues fixes. > > > > This bug is in BPF subsystem and s390 architecture specific. Patches > > haven't been backported to 4.4 kernel. However, according to the > > cip-kernel-config, it looks like no one uses s390, so can it ignore it > > until someone backport patches? > > > > CVSS v3 score is not provided. > > > > Fixed status > > > > mainline: [db7bee653859ef7179be933e7d1384644f795f26, > > 6e61dc9da0b7a0d91d57c2e20b5ea4fd2d4e7e53, > > 1511df6f5e9ef32826f20db2ee81f8527154dc14] > > stable/4.19: [ddf58efd05b5d16d86ea4638675e8bd397320930] > > stable/4.9: [c22cf38428cb910f1996839c917e9238d2e44d4b, > > 8a09222a512bf7b32e55bb89a033e08522798299] > > stable/5.10: [d92d3a9c2b6541f29f800fc2bd44620578b8f8a6, > > 4320c222c2ffe778a8aff5b8bc4ac33af6d54eba, > > ab7cf225016159bc2c3590be6fa12965565d903b] > > stable/5.14: [7a31ec4d215a800b504de74b248795f8be666f8e, > > 6a8787093b04057d855822094d63d04a2506444a, > > a7593244dc31ad0eea70319f6110975f9c738dca] > > > > CVE-2021-20321: kernel: In Overlayfs missing a check for a negative > > dentry before calling vfs_rename() > > > > CVSS v3 score is not provided. > > > > A local attacker can escalate their privileges up to root via > > overlayfs vulnerability. > > Patch for 4.4 is applied > > failed(https://lore.kernel.org/stable/163378772914820@kroah.com/). It > > needs to modify the patch. I attached a patch, if it looks good, I'll > > send it to the stable mailing list. > > Thanks, I checked your patch. LGTM. > Thanks ! > Best regards, > Nobuhiro > > > -=-=-=-=-=-=-=-=-=-=-=- > Links: You receive all messages sent to this group. > View/Reply Online (#6834): https://lists.cip-project.org/g/cip-dev/message/6834 > Mute This Topic: https://lists.cip-project.org/mt/86480633/4520416 > Group Owner: cip-dev+owner@lists.cip-project.org > Unsubscribe: https://lists.cip-project.org/g/cip-dev/leave/8129101/4520416/1465703922/xyzzy [masami.ichikawa@miraclelinux.com] > -=-=-=-=-=-=-=-=-=-=-=- > Regards,
From 1e43a0933de1ab853f171de45a17b5f9c43b110e Mon Sep 17 00:00:00 2001 From: Zheng Liang <zhengliang6@huawei.com> Date: Fri, 24 Sep 2021 09:16:27 +0800 Subject: [PATCH] ovl: fix missing negative dentry check in ovl_rename() From: Zheng Liang <zhengliang6@huawei.com> commit a295aef603e109a47af355477326bd41151765b6 upstream. The following reproducer mkdir lower upper work merge touch lower/old touch lower/new mount -t overlay overlay -olowerdir=lower,upperdir=upper,workdir=work merge rm merge/new mv merge/old merge/new & unlink upper/new may result in this race: PROCESS A: rename("merge/old", "merge/new"); overwrite=true,ovl_lower_positive(old)=true, ovl_dentry_is_whiteout(new)=true -> flags |= RENAME_EXCHANGE PROCESS B: unlink("upper/new"); PROCESS A: lookup newdentry in new_upperdir call vfs_rename() with negative newdentry and RENAME_EXCHANGE Fix by adding the missing check for negative newdentry. Signed-off-by: Zheng Liang <zhengliang6@huawei.com> Fixes: e9be9d5e76e3 ("overlay filesystem") Cc: <stable@vger.kernel.org> # v3.18 Signed-off-by: Miklos Szeredi <mszeredi@redhat.com> Reference: CVE-2021-20321 Signed-off-by: Masami Ichikawa(CIP) <masami.ichikawa@cybertrust.co.jp> --- fs/overlayfs/dir.c | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/fs/overlayfs/dir.c b/fs/overlayfs/dir.c index eedacae889b9..80bf0ab52e81 100644 --- a/fs/overlayfs/dir.c +++ b/fs/overlayfs/dir.c @@ -824,9 +824,13 @@ static int ovl_rename2(struct inode *olddir, struct dentry *old, } } else { new_create = true; - if (!d_is_negative(newdentry) && - (!new_opaque || !ovl_is_whiteout(newdentry))) - goto out_dput; + if (!d_is_negative(newdentry)) { + if (!new_opaque || !ovl_is_whiteout(newdentry)) + goto out_dput; + } else { + if (flags & RENAME_EXCHANGE) + goto out_dput; + } } if (olddentry == trap) -- 2.33.0