|
|
Message-ID: <378c2ca2-417a-4969-bda5-b7d3f3e8b6fd@gmail.com> Date: Sat, 2 May 2026 02:39:12 -0400 From: Demi Marie Obenour <demiobenour@...il.com> To: Eric Biggers <ebiggers@...nel.org> Cc: oss-security@...ts.openwall.com, Jan Schaumann <jschauma@...meister.org>, iwd@...ts.linux.dev, Linux kernel mailing list <linux-kernel@...r.kernel.org>, Linux kernel mailing list <linux-kernel@...r.kernel.org> Subject: Re: CVE-2026-31431: CopyFail: linux local privilege scalation On 5/1/26 23:54, Eric Biggers wrote: > On Sat, May 02, 2026 at 03:35:58AM +0000, Eric Biggers wrote: >> So the idea would be something along the lines of: > > And just to make sure no one gets the wrong impression: just because > there seem to be ways in which the attack surface of AF_ALG could/should > be reduced doesn't mean that userspace should keep using it (or even > worse, start to use it). Fixing programs like iwd needs to proceed > concurrently, so that eventually (some years down the line) the problem > can finally be fully solved by removing AF_ALG from the kernel source. > > - Eric Can AF_ALG be emulated using LD_PRELOAD? That would allow it to be eliminated from the kernel much more quickly, as one would not need to get rid of all of its existing users. It would even work for those who need AF_ALG because of closed source binaries, who otherwise will have no alternative other than running an old kernel in a VM. -- Sincerely, Demi Marie Obenour (she/her/hers) Download attachment "OpenPGP_0xB288B55FFF9C22C1.asc" of type "application/pgp-keys" (7141 bytes) Download attachment "OpenPGP_signature.asc" of type "application/pgp-signature" (834 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.