|
Message-ID: <20160412074937.GA30265@suse.de> Date: Tue, 12 Apr 2016 09:49:37 +0200 From: Sebastian Krahmer <krahmer@...e.com> To: oss-security@...ts.openwall.com Cc: cve-assign@...re.org, dave@...lke.cc Subject: CVE-Request for brltty auth bypass Hi brltty is using polkit to control access to system ressources ("Write to the braille display"). It is doing so by using the PID of the process connecting to the server socket. This is racy. The unix polkit subject is deprecated, but if its used, the UID should be specified as well, so it doesnt get looked up in /proc. I already contacted upstream (Cc) but so far no response. You can find my (untested) proposed patch at: https://bugzilla.suse.com/show_bug.cgi?id=967436 Its probably not the worst issue, but should be fixed nevertheless. Sebastian -- ~ perl self.pl ~ $_='print"\$_=\47$_\47;eval"';eval ~ krahmer@...e.com - SuSE Security Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.