Bug 947732 (CVE-2015-7312) - VUL-0: CVE-2015-7312: kernel-source: Use-after-free in Linux kernel with aufs mmap patch
Summary: VUL-0: CVE-2015-7312: kernel-source: Use-after-free in Linux kernel with aufs...
Status: RESOLVED INVALID
Alias: CVE-2015-7312
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/156908/
Whiteboard: CVSSv2:NVD:CVE-2015-7312:4.4:(AV:L/AC...
Keywords:
Depends on:
Blocks:
 
Reported: 2015-09-28 08:11 UTC by Victor Pereira
Modified: 2016-09-06 16:19 UTC (History)
6 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Victor Pereira 2015-09-28 08:11:34 UTC
CVE-2015-7312

from OSS-security list:
"
The aufs (Advanced Union Filesystem) project provides an optional patch
for the Linux kernel, called either aufs3-mmap.patch or
aufs4-mmap.patch, which is needed to ensure correct behaviour of
memory-mapped files from an aufs mount.

Each memory mapping (vma) holds a reference to the file that is mapped.
This patch makes it also hold a reference to the virtual file on the
union mount through which the file was found, where applicable.

In two functions, madvise_remove() and sys_msync(), it is necessary to
take an extra reference to the mapped file before unlocking the current
memory management state, as the vma may be freed after that point.
Unfortunately the aufs patch introduces later uses of the vma, resulting
in a potential use-after-free.  This is certainly exploitable for a
minor denial of service (BUG in process context, so the task can't be
cleaned up properly but the system does not panic) but might also be
usable for privilege escalation.

I posted a patch here that works for me:
http://sourceforge.net/p/aufs/mailman/message/34449209/
"

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7312
http://seclists.org/oss-sec/2015/q3/620
http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-7312.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7312
Comment 1 Swamp Workflow Management 2015-09-28 22:00:30 UTC
bugbot adjusting priority
Comment 2 Takashi Iwai 2015-09-29 14:18:18 UTC
Do we support aufs in any our products...?
Comment 3 David Sterba 2015-09-29 15:55:42 UTC
I've found only references to SLE10SP2 and some opensuse 11.x but none of the current branches contain aufs, I guess it's and invalid candidate.
Comment 4 Borislav Petkov 2015-10-02 08:40:52 UTC
So not affected. Bouncing back.
Comment 5 Marcus Meissner 2015-10-21 09:48:01 UTC
aufs not included in current SLE kernels, close