Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <20151105152732.904A66C0357@smtpvmsrv1.mitre.org>
Date: Thu,  5 Nov 2015 10:27:32 -0500 (EST)
From: cve-assign@...re.org
To: vdronov@...hat.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com, pmatouse@...hat.com
Subject: Re: CVE request -- Linux kernel: selinux: rate-limit unrecognized netlink message warnings in selinux_nlmsg_perm()

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> https://bugzilla.redhat.com/show_bug.cgi?id=1278005
> http://article.gmane.org/gmane.linux.kernel.lsm/25958

Our current feeling is that this might be best categorized as a
security enhancement (with no CVE ID) rather than a vulnerability fix.
Is there a documented policy that a privilege boundary is crossed in
all cases where a printk can be triggered by an unprivileged user, or
cases where the number of printk calls is somehow "too many" or the
required circumstances happen "too often"?

We'd like to avoid a situation where a CVE ID is needed every time
that a kernel patch exists that changes a printk to a
pr_warn_ratelimited (regardless of whether the patch is ultimately
added to the stable kernel).

We feel it's more reasonable to have a CVE ID in a case where code is
intended to have the functionality of printing something (with a rate
limit), but the functionality is broken because of an inadvertent
coding error, or because of a divergence between a distribution kernel
and upstream, e.g., something like

  https://bugzilla.redhat.com/show_bug.cgi?id=1115545#c5
  http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bb1dc0bacb8ddd7ba6a5906c678a5a5a110cf695

but where a pr_warn_ratelimited was supposed to alert a system
administrator about an attack.

(Also, 1115545#c5 mentions "I think maybe the reason no one has
noticed is due to the low usage of ratelimiting - from what I counted
there were only a handful of pr_warn_ratelimit calls, and most were in
nfs.")

An example similar to the current one apparently does not have a CVE:

  http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bfc5184b69cf9eeb286137640351c650c27f118a

People have proposed putting pr_warn_ratelimited into the
nfs4_schedule_state_manager function in the
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/tree/fs/nfs/nfs4state.c
file, but that hasn't happened:

  https://bugs.launchpad.net/bugs/1423472

http://unix.stackexchange.com/questions/130742/how-to-enable-printk-selectively
discusses configuration options, suggesting that the security
enhancement of putting in a pr_warn_ratelimited is not needed on all
machines.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=L5+e
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.