oss-sec mailing list archives
CVE-2023-51786: Lustre: incorrect access control resulting in potential data compromise or privilege escalation
From: daniel <sd () x17 eu>
Date: Tue, 12 Mar 2024 09:36:57 +0100
According to the post on the Lustre announce mailing list [1], a vulnerability has been fixed which provides access to files and folders for which a user has no permission for.
<quote> Scope of Issue:Users can gain access to files/folders in the filesystem that they should not have permission to access based on their user/group ID file access permissions, leading to potential data compromise or privilege escalation. This does not allow access to files that are outside a subdirectory mountpoint/nodemap that are not visible in the client mountpoint.
</quote> Only specific combinations of Server, Client and Kernel are vulnerable. The issue is mitigated by any of the following: 1. Disable User Namespaces (see below)2. Upgrade all clients to a Lustre version including a fix (e.g.. 2.15.4) 3. Upgrade servers to a Lustre version including a fix for this issue (e.g. 2.15.4)
A detailed description of how to disable user Namespaces is included in the original posting [1].
I was unable to pinpoint the exact change which fixed the issue. It is also noteworthy, that the issue was silently fixed. Date of the fixed version 23 Dec 2023 and date of the security announcement 27 Feb 2024.
Affected versions: Lustre Server version: 2.14 – 2.15.3 Lustre Client version: 2.12 – 2.15.3 References:[1] http://lists.lustre.org/pipermail/lustre-announce-lustre.org/2024/000270.html
https://nvd.nist.gov/vuln/detail/CVE-2023-51786
Current thread:
- CVE-2023-51786: Lustre: incorrect access control resulting in potential data compromise or privilege escalation daniel (Mar 12)