|
Message-ID: <20230418212720.E5HaB%steffen@sdaoden.eu> Date: Tue, 18 Apr 2023 23:27:20 +0200 From: Steffen Nurpmeso <steffen@...oden.eu> To: oss-security@...ts.openwall.com Subject: Re: CVE-2023-2002: Linux Bluetooth: Unauthorized management command execution 0xef967c36@...il.com wrote in <5e92a8d676a0ddfb5c426f3412bd7aa6.1ab4a9b2@...ited.turnovers>: |On Tue, Apr 18, 2023 at 09:28:22PM +0200, Solar Designer wrote: |> On Tue, Apr 18, 2023 at 08:13:24PM +0300, 0xef967c36@...il.com wrote: ... |Here is (possibly partial) list of collisions, obtained with uniq -D |from src/ioctlent0.h (a file autogenerated when building strace). ... In that case even the FreeBSD rights(4) (capsicum(4)) manual entry CAP_IOCTL Permit ioctl(2). Be aware that this system call has enormous scope, including potentially global scope for some objects. The list of permitted ioctl commands can be further limited with the cap_ioctls_limit(2) system call. is teethless. --steffen | |Der Kragenbaer, The moon bear, |der holt sich munter he cheerfully and one by one |einen nach dem anderen runter wa.ks himself off |(By Robert Gernhardt)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.