LWN: Comments on "Denial of reality vulnerabilities" https://lwn.net/Articles/191080/ This is a special feed containing comments posted to the individual LWN article titled "Denial of reality vulnerabilities". en-us Sat, 20 Sep 2025 09:54:38 +0000 Sat, 20 Sep 2025 09:54:38 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net Denial of reality vulnerabilities https://lwn.net/Articles/192491/ https://lwn.net/Articles/192491/ csamuel Hear hear! Well said JC..<br> Mon, 24 Jul 2006 09:19:31 +0000 What of cron? https://lwn.net/Articles/192253/ https://lwn.net/Articles/192253/ Cato Exactly - the fact that cron can execute strings found in the middle of core files is a security issue and should be fixed at the same time.<br> Fri, 21 Jul 2006 05:59:28 +0000 What of cron? https://lwn.net/Articles/192037/ https://lwn.net/Articles/192037/ robbe <font class="QuotedText">&gt; but there are plenty of programs that execute scripts located in particular </font><br> <font class="QuotedText">&gt; directories of /etc"</font><br> <p> Care to name a few affected programs/services?<br> <p> Things that execute everything in a directory (e.g. /etc/rcX.d) are not vulnerable, because core files are not executable. I tried feeding one to bash, dash, and zsh all bombed out with errors (bash's being most wise).<br> <p> There may be programs as stupid as cron, but they should be fixed, if only in the interest of safety (guard against errors).<br> <p> Thu, 20 Jul 2006 08:11:57 +0000 Denial of reality vulnerabilities https://lwn.net/Articles/192039/ https://lwn.net/Articles/192039/ Wol If the author HADN'T realised, then he clearly hadn't read the initial advisories, and shouldn't have been writing the official advisory.<br> <p> mjcox said the first announcement on the private security mailing list described it as a privilege escalation problem.<br> <p> Cheers,<br> Wol<br> Thu, 20 Jul 2006 08:08:10 +0000 What of cron? https://lwn.net/Articles/192034/ https://lwn.net/Articles/192034/ mjthayer Perhaps part of the problem here is just that too many privileges are <br> given to system tasks by default. Capability (as in EROS etc) fans would <br> certainly say so, but I think that even the possibilities available in a <br> standard Linux system are not being fully utilised.<br> <p> For instance: a cron job to process man pages does not have to run as <br> root. If the ownership of the man pages is set to user "man", that job <br> can be run setuid man. cron itself can run setuid - to something which <br> only has the privileges to execute those setuid cron scripts.<br> <p> I think the same could be applied to a lot of system daemons and would <br> result in a somewhat safer system. How many processes really need to run <br> with root privileges? Most just need access to a subset of files.<br> <p> Thu, 20 Jul 2006 07:59:06 +0000 What of cron? https://lwn.net/Articles/191851/ https://lwn.net/Articles/191851/ hein.zelle Has this behaviour of cron led to any separate security advisories / fixes yet?<br> Wed, 19 Jul 2006 07:25:54 +0000 What of cron? https://lwn.net/Articles/191343/ https://lwn.net/Articles/191343/ hppnq [Nice, my own thread.] <p> Well, investigating a bit more turns up that indeed, dumping core in /etc/cron.d <em>is</em> sufficient: cron really doesn't care at all what files are called in /etc/cron.d. OMG. OMG. OMG. Jon, you were right as always. <p> (But really, cron's security model is *unbelievably* stupid.) Fri, 14 Jul 2006 05:23:36 +0000 Denial of reality vulnerabilities https://lwn.net/Articles/191309/ https://lwn.net/Articles/191309/ giraffedata This editorial seems to be arguing with somebody, but whom? <p> I assume the descriptions of the bug as a DOS are just errors. If the author had realized there's a way to exploit it to get privilege escalation, he would have written it up that way. Is someone still claiming the original description is appropriate? <p> If it's just an editorial against making mistakes, there's not much point -- it's preaching to the converted. Thu, 13 Jul 2006 20:16:34 +0000 What of cron? https://lwn.net/Articles/191298/ https://lwn.net/Articles/191298/ hppnq <em><blockquote>I just didn't investigate whether cron works as designed in that case. </blockquote></em> <p> Yup, it does. So also in the /etc/cron.d case, a cracker would at least need to be able to manipulate the core dump's filename as well. Which requires root privileges on my system. <p> Again, this bug <em>is</em> trivially exploitable. But not by just dumping core in /etc/cron.d. Thu, 13 Jul 2006 19:31:51 +0000 What of cron? https://lwn.net/Articles/191290/ https://lwn.net/Articles/191290/ hppnq Yes, that's what I meant. I just didn't investigate whether cron works as designed in that case. ;-) <p> (By the way, I did <em>not</em> mean to make the problem look any less serious than it is, though. Patch!) Thu, 13 Jul 2006 18:26:36 +0000 Exploited https://lwn.net/Articles/191286/ https://lwn.net/Articles/191286/ mp Apparently this very vulnerability was used to gain root access in the recent compromise of gluck.debian.org.<br> <a href="http://lists.debian.org/debian-news/debian-news-2006/msg00030.html">http://lists.debian.org/debian-news/debian-news-2006/msg0...</a><br> Thu, 13 Jul 2006 18:15:13 +0000 What of cron? https://lwn.net/Articles/191281/ https://lwn.net/Articles/191281/ corbet /etc/cron.d is a very different place, it has nothing to do with per-user crontabs at all. Thu, 13 Jul 2006 18:11:15 +0000 What of cron? https://lwn.net/Articles/191271/ https://lwn.net/Articles/191271/ hppnq Cron gets the username from the filename, not the actual ownership of the file. (At least, on a default Dapper, this happens for files in /var/spool/cron/crontabs, where they end up if edited through crontab -e, for instance. Newer incantations seem to expect a username on the cronjob line.) <p> If the user "core" does not exist, a crontab -- at least, in /var/spool/cron/crontabs, haven't investigated /etc/cron.d and friends -- called "core" will be ignored by crond and an error message indicating the failure will be logged; otherwise, its jobs, if any, are run as the user core. <p> So if a user without root privileges can cause core files to be called "root", you're in trouble. On my default Dapper, this cannot be easily done -- but YMMV. ;-) <p> Oh, and yes, my Dapper also checks whether the file owner is actually the user indicated by the crontab filename. Phew. ;-) Thu, 13 Jul 2006 18:08:35 +0000 What of cron? https://lwn.net/Articles/191274/ https://lwn.net/Articles/191274/ spitzak But most of those programs would get an error on the first "command" it found in the file of garbage and quit at that point, never able to reach the embedded command.<br> <p> I would think a program that keeps parsing text from the file, ignoring errors no matter how bad they are, is a security hole, as this shows. I would suspect that not just cron is at fault, I would look at every older Unix utility.<br> <p> Thu, 13 Jul 2006 17:57:09 +0000 What of cron? https://lwn.net/Articles/191272/ https://lwn.net/Articles/191272/ iabervon I'd say it's a privilege escalation kernel exploit to let non-root users write to o+rx o-w directories, generating a root-owned file, even if the filename and much of the contents can't be chosen arbitrarily.<br> Thu, 13 Jul 2006 17:55:01 +0000 What of cron? https://lwn.net/Articles/191231/ https://lwn.net/Articles/191231/ cventers Well, the issue is that prctl() can be used to set your program such that <br> its core files will be written by root, regardless of who started it.<br> <p> The rationale behind that was that you might have a program that you want <br> to be able to debug but that might be handling sensitive data, so prctl() <br> lets you say "create a core file that _only_ root can read".<br> <p> So the denial of service thing is definitely true. The cron interaction <br> just plain sucks.<br> Thu, 13 Jul 2006 15:36:05 +0000 What of cron? https://lwn.net/Articles/191225/ https://lwn.net/Articles/191225/ Thalience Furthermore, are the core dump files owned by the user, or by root?<br> <p> If the core file is still owned by the user who ran the program, it seems like a very bad idea for cron to read files not owned by root from /etc/cron.d/.<br> Thu, 13 Jul 2006 14:54:37 +0000 What of cron? https://lwn.net/Articles/191220/ https://lwn.net/Articles/191220/ cventers Yeah, it's not the kernel's fault that cron trusts any garbage you throw <br> at it. So I'd say the _kernel_ problem is a denial of service issue, but <br> the /distributions/ now have privilege escalation bugs to fix.<br> Thu, 13 Jul 2006 14:40:23 +0000 What of cron? https://lwn.net/Articles/191219/ https://lwn.net/Articles/191219/ droundy Cron is a trivial example, but there are plenty of programs that execute scripts located in particular directories of /etc (although perhaps not so often), so a bug that allows users to dump files in directories where they have no permissions I would say is inherently a priviledge escalation bug.<br> <p> Yes, cron could be more careful, but on the other hand, relying on unix permissions to restrict users doesn't seem like an inherent security flaw.<br> Thu, 13 Jul 2006 14:39:27 +0000 What of cron? https://lwn.net/Articles/191218/ https://lwn.net/Articles/191218/ lysse Perhaps I'm missing something here, but couldn't it be regarded as a bug in cron that it doesn't do a basic sanity check on its configuration files, to ensure that they are actually text files...? In which case, what turns the security problem from a DoS into an easy root-hole is the interaction of two bugs, rather than either bug in isolation... ouch.<br> <p> Thu, 13 Jul 2006 14:19:12 +0000 Debian https://lwn.net/Articles/191202/ https://lwn.net/Articles/191202/ paravoid Debian's stable is unaffected by this issue (2.6.8 without a backported bug).<br> testing (etch)/unstable's 2.6.16/17 are both vulnerable, not for long I presume.<br> Thu, 13 Jul 2006 12:32:39 +0000 Denial of reality vulnerabilities https://lwn.net/Articles/191185/ https://lwn.net/Articles/191185/ tres Actually it appears to have been fixed almost a week ago. Right about the time of disclosure.<br> <p> Thu Jul 6 23:33:57 2006 UTC (6 days, 10 hours ago) by dsd <br> Update to Linux 2.6.16.24 for coredump privilege escalation security fix<br> <p> Fri Jul 7 10:20:12 2006 UTC (5 days, 23 hours ago) by dsd <br> Update to Linux 2.6.17.4 for coredump privilege escalation security fix<br> Thu, 13 Jul 2006 10:28:51 +0000 Denial of reality vulnerabilities https://lwn.net/Articles/191184/ https://lwn.net/Articles/191184/ tres Gentoo appears to be fixed. CVS Changelog entries:<br> <a href="http://www.gentoo.org/cgi-bin/viewcvs.cgi/sys-kernel/gentoo-sources/ChangeLog?rev=1.309&amp;view=log">http://www.gentoo.org/cgi-bin/viewcvs.cgi/sys-kernel/gent...</a><br> <p> Thu, 13 Jul 2006 10:24:05 +0000 Denial of reality vulnerabilities https://lwn.net/Articles/191178/ https://lwn.net/Articles/191178/ cjwatson Martin Pitt's improved the Ubuntu advisory text now at <a href="http://www.ubuntu.com/usn/usn-311-1">http://www.ubuntu.com/usn/usn-311-1</a>, although it's too late to fix the e-mail.<br> Thu, 13 Jul 2006 09:30:10 +0000 Timeline https://lwn.net/Articles/191166/ https://lwn.net/Articles/191166/ mjcox@redhat.com To clarify on the article text here is the timeline of discovery<br> <p> 19 June 2006: Red Hat security team first aware of issue. <br> <p> 21 June 2006: Red Hat notified kernel security team and vendor-sec (private list which other Linux vendors security teams take part in) under embargo. We gave our working exploit showing this was a privilege escalation flaw to these groups.<br> <p> 06 July 2006: Embargo lifted<br> <p> <p> Thu, 13 Jul 2006 07:25:14 +0000 Denial of reality vulnerabilities https://lwn.net/Articles/191164/ https://lwn.net/Articles/191164/ dune73 Good journalism puts the finger where it hurts. This is an example of good journalism. Thanks.<br> Thu, 13 Jul 2006 06:49:45 +0000 Denial of reality vulnerabilities https://lwn.net/Articles/191143/ https://lwn.net/Articles/191143/ mattdm As of early evening Jul 12, there's 2.6.17.4 kernel updates in the testing area for Fedora Core 4 and 5.<br> Thu, 13 Jul 2006 03:32:32 +0000