Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20230418005741.GA25557@openwall.com>
Date: Tue, 18 Apr 2023 02:57:41 +0200
From: Solar Designer <solar@...nwall.com>
To: oss-security@...ts.openwall.com
Cc: Ruihan Li <lrh2000@....edu.cn>, "Todd C. Miller" <Todd.Miller@...o.ws>
Subject: Re: CVE-2023-2002: Linux Bluetooth: Unauthorized management command execution

Hi,

Thank you Ruihan Li for finding and handling this vulnerability so well,
and for the detailed write-up.

When discussing this on linux-distros a week ago, I wrote:

> Regarding the vulnerability itself, do you think it'd be a good idea to
> also inform the maintainer of sudo?  My thinking is that sudo could be
> hardened not to trigger ioctl's (which I guess it does via tcgetattr()
> or such?) while having euid=0 (and thus root's typical capabilities) -
> it could temporarily seteuid(uid), then switch back due to saved uid.
> 
> Did you identify (m)any other programs usable for this attack?  I guess
> some with functionality "similar" to sudo's could also be "affected"
> (there are several implementations of su in different packages for
> Linux, pkexec, various container entry tools).

And indeed Ruihan Li came up with the list of other likely usable
programs on a typical Linux distro, which makes the point of hardening
only sudo moot, and so we decided to postpone further discussion until
this is public on oss-security.

OTOH, not all distros are typical.  Besides Android, we got rid of all
SUID binaries in default install of Owl over a decade ago.  While Owl is
now effectively EOL'ed, some of its legacy lives on in ALT Linux
distros, which are maintained, and other distros can do similar - it's
primarily a matter of caring to do it or not.  We did not package sudo
in Owl, but if someone were to install it then it'd be the only program
exposing this kernel vulnerability.  So in that case, hardening sudo
would have helped.

On Sun, Apr 16, 2023 at 10:57:27PM +0200, Steffen Nurpmeso wrote:
> So this general beating onto SETUID or super capable programs
> smells like bad fish Hollywood boom-boom again, no?

That lengthy list of them is actually in defense of sudo not having been
hardened in this respect - it shows that this would not matter on a
typical Linux system anyway.

> You have to do some things, and if you give up privileges
> thereafter, extended capabilities are gone.

POSIX saved IDs should help retain/regain the capabilities.

Alexander

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.