Linux user namespaces can bypass group-based restrictions

2014.11.17
Credit: Andy
Risk: Medium
Local: Yes
Remote: No
CVE: N/A
CWE: N/A

This is a heads-up, as there is no fix right now. On Linux, if you can unshare your user namespace (which is the case on many distributions), then you can map your fsuid and fsgid into the new namespace and, inside that namespace, drop all of your other groups. This may allow you to access files protected by POSIX ACLs as "other", even if the ACL should have prohibited it based on one of your supplementary group IDs. This does not appear to allow you to violate negative sudoers group entries and the like, since sudo(8) would be confined to the user namespace as well and will therefore not gain privilege. To those who care about credit: this was discovered by some combination of me, Theodore Ts'o, Eric Biederman, Alan Cox, and Casey Schaufler. See here for some more discussion: http://thread.gmane.org/gmane.linux.man/7385/ Disabling CONFIG_USER_NS works around this issue. --Andy

References:

http://seclists.org/oss-sec/2014/q4/653


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top