Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20230418212720.E5HaB%steffen@sdaoden.eu>
Date: Tue, 18 Apr 2023 23:27:20 +0200
From: Steffen Nurpmeso <steffen@...oden.eu>
To: oss-security@...ts.openwall.com
Subject: Re: CVE-2023-2002: Linux Bluetooth:
 Unauthorized management command execution

0xef967c36@...il.com wrote in
 <5e92a8d676a0ddfb5c426f3412bd7aa6.1ab4a9b2@...ited.turnovers>:
 |On Tue, Apr 18, 2023 at 09:28:22PM +0200, Solar Designer wrote:
 |> On Tue, Apr 18, 2023 at 08:13:24PM +0300, 0xef967c36@...il.com wrote:
  ...
 |Here is (possibly partial) list of collisions, obtained with uniq -D
 |from src/ioctlent0.h (a file autogenerated when building strace).
 ...

In that case even the FreeBSD rights(4) (capsicum(4)) manual entry

   CAP_IOCTL    Permit ioctl(2).  Be aware that this system call has
                enormous scope, including potentially global scope
                for some objects.  The list of permitted ioctl
                commands can be further limited with the
                cap_ioctls_limit(2) system call.

is teethless.

--steffen
|
|Der Kragenbaer,                The moon bear,
|der holt sich munter           he cheerfully and one by one
|einen nach dem anderen runter  wa.ks himself off
|(By Robert Gernhardt)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.