Bugzilla – Bug 986570
VUL-0: CVE-2016-1237: kernel-source: nfsd: any user can set a file's ACL over NFS and grant access to it
Last modified: 2018-07-03 21:26:45 UTC
CVE-2016-1237 From: Salvatore Bonaccorso <carnil () debian org> Date: Sat, 25 Jun 2016 07:12:39 +0200 Linux CVE-2016-1237: nfsd: any user can set a file's ACL over NFS and grant access to it Hi David Sinquin reported that anyone may be able to grant themselves permissions to a file by setting the ACL. nfsd did not check permissions when setting ACLs. CVE-2016-1237 was assigned by the Debian security team for this issue were David Singuin initially reported the issue. The permission checks and inode locking were lost in a refactoring with commit 4ac7249ea5a0ceef9f8269f63f33cc873c3fac61 which was in v3.14-rc1. The issue is fixed with commit 999653786df6954a31044528ac3f7a5dadca08f4 in Linus' tree. Introduced in: https://git.kernel.org/linus/4ac7249ea5a0ceef9f8269f63f33cc873c3fac61 (v3.14-rc1) Prerequisite: https://git.kernel.org/linus/485e71e8fb6356c08c7fc6bcce4bf02c9a9a663f Fixed by https://git.kernel.org/linus/999653786df6954a31044528ac3f7a5dadca08f4 Regards, Salvatore References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1237 http://seclists.org/oss-sec/2016/q2/602
i think we did not backport this patch, so this issue affects only SLES 12 SP2 and openSUSE. (Linux Kernel 3.14 + )
bugbot adjusting priority
Backported and submitted to sle-12-sp2 master stable opensuse-42.1 openSUSE-13.2 I think that's all...
Patches submitted, so assigning to security team
This is an autogenerated message for OBS integration: This bug (986570) was mentioned in https://build.opensuse.org/request/show/423661 42.1 / kernel-source
openSUSE-SU-2016:2290-1: An update that solves 17 vulnerabilities and has 9 fixes is now available. Category: security (important) Bug References: 963931,970948,971126,971360,974266,978821,978822,979018,979213,979879,980371,981058,981267,986362,986365,986570,987886,989084,989152,989176,990058,991110,991608,991665,994296,994520 CVE References: CVE-2015-8787,CVE-2016-1237,CVE-2016-2847,CVE-2016-3134,CVE-2016-3156,CVE-2016-4485,CVE-2016-4486,CVE-2016-4557,CVE-2016-4569,CVE-2016-4578,CVE-2016-4580,CVE-2016-4805,CVE-2016-4951,CVE-2016-4998,CVE-2016-5696,CVE-2016-6480,CVE-2016-6828 Sources used: openSUSE Leap 42.1 (src): drbd-8.4.6-8.1, hdjmod-1.28-24.1, ipset-6.25.1-5.1, kernel-debug-4.1.31-30.2, kernel-default-4.1.31-30.2, kernel-docs-4.1.31-30.3, kernel-ec2-4.1.31-30.2, kernel-obs-build-4.1.31-30.3, kernel-obs-qa-4.1.31-30.1, kernel-obs-qa-xen-4.1.31-30.1, kernel-pae-4.1.31-30.2, kernel-pv-4.1.31-30.2, kernel-source-4.1.31-30.1, kernel-syms-4.1.31-30.1, kernel-vanilla-4.1.31-30.2, kernel-xen-4.1.31-30.2, lttng-modules-2.7.0-2.1, pcfclock-0.44-266.1, vhba-kmp-20140928-5.1
openSUSE-SU-2016:2625-1: An update that solves 12 vulnerabilities and has 19 fixes is now available. Category: security (important) Bug References: 1000287,1001486,1003077,1003925,1003931,1004045,1004418,1004462,881008,909994,911687,922634,951155,960689,978094,980371,986570,989152,991247,991608,991665,993890,993891,994296,994520,994748,994752,994759,996664,999600,999932 CVE References: CVE-2015-7513,CVE-2015-8956,CVE-2016-0823,CVE-2016-1237,CVE-2016-5195,CVE-2016-5696,CVE-2016-6327,CVE-2016-6480,CVE-2016-6828,CVE-2016-7117,CVE-2016-7425,CVE-2016-8658 Sources used: openSUSE 13.2 (src): bbswitch-0.8-3.22.1, cloop-2.639-14.22.1, crash-7.0.8-22.1, hdjmod-1.28-18.23.1, ipset-6.23-22.1, kernel-debug-3.16.7-45.1, kernel-default-3.16.7-45.1, kernel-desktop-3.16.7-45.1, kernel-docs-3.16.7-45.2, kernel-ec2-3.16.7-45.1, kernel-obs-build-3.16.7-45.1, kernel-obs-qa-3.16.7-45.1, kernel-obs-qa-xen-3.16.7-45.1, kernel-pae-3.16.7-45.1, kernel-source-3.16.7-45.1, kernel-syms-3.16.7-45.1, kernel-vanilla-3.16.7-45.1, kernel-xen-3.16.7-45.1, pcfclock-0.44-260.22.1, vhba-kmp-20140629-2.22.1, virtualbox-5.0.28-54.2, xen-4.4.4_05-51.2, xtables-addons-2.6-24.1
all released