Scheduled Maintenance: We are aware of an issue with Google, AOL, and Yahoo services as email providers which are blocking new registrations. We are trying to fix the issue and we have several internal and external support tickets in process to resolve the issue. Please see: viewtopic.php?t=158230

 

 

 

Debian kernels not getting patched for CVE-2016-8655?

If none of the specific sub-forums seem right for your thread, ask here.
Post Reply
Message
Author
User avatar
stevepusser
Posts: 12930
Joined: 2009-10-06 05:53
Has thanked: 41 times
Been thanked: 72 times

Debian kernels not getting patched for CVE-2016-8655?

#1 Post by stevepusser »

https://security-tracker.debian.org/tra ... -2016-8655

Ubuntu pushed their fix out on Dec. 1, for Pete's sake. Does anyone know how to find out what the holdup is? I'm getting ready to adapt the patch to the 3.16 kernel myself and rebuild it if it takes any longer!
MX Linux packager and developer

reinob
Posts: 1196
Joined: 2014-06-30 11:42
Has thanked: 99 times
Been thanked: 47 times

Re: Debian kernels not getting patched for CVE-2016-8655?

#2 Post by reinob »

I guess because:
"Non-privileged user namespaces disabled by default, only vulnerable with sysctl kernel.unprivileged_userns_clone=1"

still, it should be patched (someday).

User avatar
Head_on_a_Stick
Posts: 14114
Joined: 2014-06-01 17:46
Location: London, England
Has thanked: 81 times
Been thanked: 133 times

Re: Debian kernels not getting patched for CVE-2016-8655?

#3 Post by Head_on_a_Stick »

@reinob: the Debian kernels have user namespaces enabled and thus are vulnerable:

Code: Select all

empty@jessie:~$ grep USER_NS /boot/config-4.7.0-0.bpo.1-amd64 
CONFIG_USER_NS=y
@stevepusser: this vulnerability only affects those running unprivileged containers, AFAICT.
deadbang

User avatar
stevepusser
Posts: 12930
Joined: 2009-10-06 05:53
Has thanked: 41 times
Been thanked: 72 times

Re: Debian kernels not getting patched for CVE-2016-8655?

#4 Post by stevepusser »

Head_on_a_Stick wrote:@reinob: the Debian kernels have user namespaces enabled and thus are vulnerable:

Code: Select all

empty@jessie:~$ grep USER_NS /boot/config-4.7.0-0.bpo.1-amd64 
CONFIG_USER_NS=y
@stevepusser: this vulnerability only affects those running unprivileged containers, AFAICT.
Thanks--do you think that includes Flatpaks?
MX Linux packager and developer

User avatar
Head_on_a_Stick
Posts: 14114
Joined: 2014-06-01 17:46
Location: London, England
Has thanked: 81 times
Been thanked: 133 times

Re: Debian kernels not getting patched for CVE-2016-8655?

#5 Post by Head_on_a_Stick »

stevepusser wrote:do you think that includes Flatpaks?
I don't think so, Flatpaks work fine in Arch and that has always had CONFIG_USER_NS unset.

https://bugs.archlinux.org/task/36969
deadbang

User avatar
gradinaruvasile
Posts: 935
Joined: 2010-01-31 22:03
Location: Cluj, Romania
Contact:

Re: Debian kernels not getting patched for CVE-2016-8655?

#6 Post by gradinaruvasile »

From the link you posted:
Non-privileged user namespaces disabled by default, only vulnerable with sysctl kernel.unprivileged_userns_clone=1
So if you have:

Code: Select all

$ sysctl kernel.unprivileged_userns_clone
kernel.unprivileged_userns_clone = 0
Which is the default it should not be a problem.

On Ubuntu (16.04.1 LTS) though you have:

Code: Select all

# sysctl kernel.unprivileged_userns_clone
kernel.unprivileged_userns_clone = 1

reinob
Posts: 1196
Joined: 2014-06-30 11:42
Has thanked: 99 times
Been thanked: 47 times

Re: Debian kernels not getting patched for CVE-2016-8655?

#7 Post by reinob »

gradinaruvasile wrote:From the link you posted:
Non-privileged user namespaces disabled by default, only vulnerable with sysctl kernel.unprivileged_userns_clone=1
So if you have:

Code: Select all

$ sysctl kernel.unprivileged_userns_clone
kernel.unprivileged_userns_clone = 0
Which is the default it should not be a problem.

On Ubuntu (16.04.1 LTS) though you have:

Code: Select all

# sysctl kernel.unprivileged_userns_clone
kernel.unprivileged_userns_clone = 1
Thanks for clarifying what I tried to say above! :)

jm009
Posts: 5
Joined: 2016-04-02 20:42

Re: Debian kernels not getting patched for CVE-2016-8655?

#8 Post by jm009 »

I have unprivileged containers on Debian Jessie, with lxc from backports... :-(
My virtual server provider (kvm) wants additional money, if I want to use kvm instead of the containers.
Is there any hope, that this will get fixed on Jessie?

User avatar
gradinaruvasile
Posts: 935
Joined: 2010-01-31 22:03
Location: Cluj, Romania
Contact:

Re: Debian kernels not getting patched for CVE-2016-8655?

#9 Post by gradinaruvasile »

jm009 wrote:Is there any hope, that this will get fixed on Jessie?
ATM Jessie-backports has the 4.8.11 kernel. Next probably will be 4.8.15 which has the fix (4.8.15 is in Unstable right now).

jm009
Posts: 5
Joined: 2016-04-02 20:42

Re: Debian kernels not getting patched for CVE-2016-8655?

#10 Post by jm009 »

Thank you, I think I understand the idea now...
I wait for 4.8.11 being fixed, or 4.8.15 beeing included in stretch (=testing) what will probably/hopefully happen...
Then I do

Code: Select all

apt-get -t jessie-backports install linux-image-amd64 linux-image-4.8.0-0.bpo.2-amd64
(ATM = "at the moment"... I didn't decode this at the first look :-) )

jm009
Posts: 5
Joined: 2016-04-02 20:42

Re: Debian kernels not getting patched for CVE-2016-8655?

#11 Post by jm009 »

In looking at this https://security-tracker.debian.org/tra ... kage/linux
I see that the default Jessie kernel has much more unfixed vulnerabilities.

So today I wanted to test, if my server will run with a newer kernel from backports.
When I select linux-image-4.8.0-0.bpo.2-amd64 in aptitude, it says:

-----
Some dependencies of linux-image-4.8.0-0.bpo.2-amd64 are not satisfied:

* linux-image-4.8.0-0.bpo.2-amd64 depends on linux-base (<=4.3~)
-----

Can I install this kernel anyway, and will it work?

jm009
Posts: 5
Joined: 2016-04-02 20:42

Re: Debian kernels not getting patched for CVE-2016-8655?

#12 Post by jm009 »

Ah, I found linux-base 4.3~bpo8+1

At the moment my server is rebooting...

Seems to work.
Puh :-)

User avatar
pylkko
Posts: 1802
Joined: 2014-11-06 19:02

Re: Debian kernels not getting patched for CVE-2016-8655?

#13 Post by pylkko »

you are kind of hijacking this thread and you should make your own thread about your support request in the appropriate section (this is not it).

And FWIW, given that Jessie kernel was release years ago, it is not surprising that more security problems have been reported for it than for newer kernels. Also if you are running an important server, remember that backported packages are not maintained by the security team.

Post Reply