Bug 855809 (CVE-2013-6441) - VUL-0: CVE-2013-6441: lxc: sshd template allow privilege escalation on host
Summary: VUL-0: CVE-2013-6441: lxc: sshd template allow privilege escalation on host
Status: VERIFIED WONTFIX
Alias: CVE-2013-6441
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Deadline: 2014-04-25
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard: maint:released:sle11-sp3:56825
Keywords:
Depends on:
Blocks:
 
Reported: 2013-12-17 09:04 UTC by Sebastian Krahmer
Modified: 2014-05-19 07:54 UTC (History)
4 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sebastian Krahmer 2013-12-17 09:04:43 UTC
EMBARGOED via vsec:

On 12/16/2013 01:14 AM, Salvatore Bonaccorso wrote:
> Hi
>
> Florian Sagar discovered and reported an error in the sshd template
> of lxc allowing privilege escalation on the host. The error can be
> found on
>
> https://github.com/lxc/lxc/blob/master/templates/lxc-sshd.in#L131
>
> where the mount is not done read-only. There is already a public
> pull/commit for this issue so might not anymore be embargoed (but
> asking first here).
>
> https://github.com/dotcloud/lxc/pull/1
> https://github.com/usrflo/lxc/commit/fc09866c98468f3d832289d6608ee611a2c3c387
>
>  Steps to reproduce provided by Florian:
>
> 1) add "echo I am `id` on `hostname`" to the template lxc-sshd
> (/sbin/init from within the container, as it is writable)
>
> 2) exploit: root@agiadm:/usr/lib/lxc/templates# lxc-create -n ssh2
> -t sshd
>
> No config file specified, using the default config I am uid=0(root)
> gid=0(root) Gruppen=0(root) on agiadm ... 'sshd' template
> installed 'ssh2' created
>
> 3) no problem: root@agiadm:/usr/lib/lxc/templates# lxc-start -n
> ssh2 I am uid=0(root) gid=0(root) Gruppen=0(root) on ssh2
> /usr/lib/lxc/lxc-init ist /usr/lib/lxc/lxc-init
>
> Can a CVE be assigned to this issue?
>
> Regards, Salvatore

Please use CVE-2013-6441 for this issue.
Comment 3 Leonardo Chiquitto 2013-12-18 11:08:52 UTC
Thorsten, we already have an older submission pending with other fixes. Please branch from home:cbosdonnat:branches:SUSE:SLE-11-SP3:Update:Test/lxc, add your fixes and then submit to SUSE:SLE-11-SP3:Update:Test. Thanks.
Comment 4 Marcus Meissner 2013-12-18 12:17:12 UTC
see leonardos comment, and when done reassign this bug to security-team
Comment 5 Thorsten Behrens 2013-12-18 12:29:40 UTC
(In reply to comment #3)
> Thorsten, we already have an older submission pending with other fixes. Please
> branch from home:cbosdonnat:branches:SUSE:SLE-11-SP3:Update:Test/lxc, add your
> fixes and then submit to SUSE:SLE-11-SP3:Update:Test.
>
Done, via SR 30315
Comment 7 Swamp Workflow Management 2013-12-18 13:09:34 UTC
The SWAMPID for this issue is 55558.
This issue was rated as moderate.
Please submit fixed packages until 2014-01-01.
When done, please reassign the bug to security-team@suse.de.
Patchinfo will be handled by security team.
Comment 8 Swamp Workflow Management 2013-12-18 23:00:12 UTC
bugbot adjusting priority
Comment 10 Sebastian Krahmer 2013-12-23 13:21:20 UTC
Err, above comment contains email addresses, so dont
unprivateize it.

Nevertheless, it reads like we dont need to continue the update,
as its useless.
Comment 11 Sebastian Krahmer 2013-12-23 13:24:28 UTC
If they push the 'fix' upstream, we can get it via there
for future products, but reading his explanation makes
it useless to waste update+QA efforts.

Closing as WONTFIX.
Comment 12 Sebastian Krahmer 2013-12-23 13:28:17 UTC
Hm, reading comment#3 I let this to Leonardo, whether
the other non-sec fixes still deserve the update
(but then probably as maintenance since the CVE is revoked).
Comment 13 Stephan Barth 2014-01-02 15:43:09 UTC
I think at the moment we shouldn't do a maintenance update for the three known bugs. Both are low priority and no L3 was involved. lxc is not widely used (yet) anyway. We can do it in 4 to 8 weeks, but currently the QA queue is already quite long.
Comment 14 Leonardo Chiquitto 2014-01-06 12:19:27 UTC
I agree with Stephan and moved the bugs back to the planned updates list.

Sebastian: should we revert the security 'fix' that was checked-in? Since the CVE was revoked, mentioning it in the change log might cause confusion in the future. Not sure if it's worth the trouble to revert though :/ What's your opinion?
Comment 16 Sebastian Krahmer 2014-01-06 12:48:42 UTC
ok. so then I close this bug as well
Comment 17 Swamp Workflow Management 2014-03-28 13:08:49 UTC
The SWAMPID for this issue is 56824.
This issue was rated as low.
Please submit fixed packages until 2014-04-25.
When done, please reassign the bug to security-team@suse.de.
Patchinfo will be handled by security team.
Comment 18 Marcus Meissner 2014-03-28 13:10:05 UTC
make public
Comment 20 Sebastian Krahmer 2014-05-12 08:45:29 UTC
This particular bug was marked as WONTFIX, so I think thats OK.

However AFAIK there are other bnc's that were fixed
via this SWAMP.
Comment 22 Swamp Workflow Management 2014-05-14 18:50:59 UTC
Update released for: lxc, lxc-debuginfo, lxc-debugsource, lxc-devel
Products:
SLE-DEBUGINFO 11-SP3 (i386, ia64, ppc64, s390x, x86_64)
SLE-DESKTOP 11-SP3 (i386, x86_64)
SLE-SDK 11-SP3 (i386, ia64, ppc64, s390x, x86_64)
SLE-SERVER 11-SP3 (i386, ia64, ppc64, s390x, x86_64)
SLES4VMWARE 11-SP3 (i386, x86_64)
Comment 23 Swamp Workflow Management 2014-05-14 22:04:44 UTC
SUSE-SU-2014:0643-1: An update that solves one vulnerability and has three fixes is now available.

Category: security (low)
Bug References: 839653,839663,855809,869663
CVE References: CVE-2013-6441
Sources used:
SUSE Linux Enterprise Software Development Kit 11 SP3 (src):    lxc-0.8.0-0.21.6
SUSE Linux Enterprise Server 11 SP3 for VMware (src):    lxc-0.8.0-0.21.6
SUSE Linux Enterprise Server 11 SP3 (src):    lxc-0.8.0-0.21.6
SUSE Linux Enterprise Desktop 11 SP3 (src):    lxc-0.8.0-0.21.6