LWN: Comments on "A story of three kernel vulnerabilities" https://lwn.net/Articles/538898/ This is a special feed containing comments posted to the individual LWN article titled "A story of three kernel vulnerabilities". en-us Thu, 11 Sep 2025 06:22:11 +0000 Thu, 11 Sep 2025 06:22:11 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net Sure CAN disable unused filesystems =:^) https://lwn.net/Articles/542497/ https://lwn.net/Articles/542497/ Duncan <div class="FormattedComment"> On gentoo anyway, turning off such filesystem support, and automount support in general, is easy. Appropriate USE flags and kernel ensure support for this is NOT builtin. Of course whether you consider gentoo "a reasonably obvious way" or not is up to you, but...<br> <p> My gentoo/kde systems are build without udisks, policykit, etc support, the appropriate USE flags turned off, both due to the heavy dependencies (udisks-1 wanted lvm2, udisks2 wants gparted while I use gptfdisk, I need those installed like I need another hole in my head!). And the kernel is built for the specific system it's on, monolithic, module support turned off. (Tho I did have to package.provided a couple runtime deps, including kdesu, that I didn't need anyway. I could of course have edited and overlaid the ebuilds to kill the runtime deps, but that would have been a repeated edit over many updates. Package.provideing them only need be done once.)<br> <p> So no automounting or GUI superuser access and for SURE no support for obscure filesystems!<br> <p> Where specific privlege-required functions are to be used by the GUI user, I configure sudoers to allow the specific command, no more, no less, with or without password required, depending on the need and how locked down the command actually is. Yes, that does require that the user use the commandline for it, but IMO, if a user isn't comfortable using the commandline, they have no business running superuser/privileged commands in the first place.<br> <p> Of course that's a bit drastic for many, but that's precisely the point, gentoo, being build from source by the user, allows turning off unneeded features at end-user-controlled build-time, as opposed to centralized distro decided "someone might use it so we better enable it" defaults, at /their/ buildtime. If you want automount, turn on the appropriate USE flags, else turn them off and don't even have the otherwise required components installed in the first place. Actually, it's more than that, in effect, over time gentoo STRONGLY ENCOURAGES observance of the security "only install what you actually use" rule, because otherwise you're repeatedly building updates for stuff you don't use anyway, so if you're not actually using it, it quickly becomes simpler to just turn it off and not worry about building it any more.<br> <p> So yes, there's a "reasonably obvious" way to turn them off... switch to a distro (and desktop, if necessary, but I'd guess gnome on gentoo allows turning it off too, I just don't know for sure as I don't use it) that allows it, if yours doesn't. =:^)<br> <p> Duncan<br> </div> Tue, 12 Mar 2013 03:59:30 +0000 Can't disable unused filesystems https://lwn.net/Articles/541035/ https://lwn.net/Articles/541035/ nix <div class="FormattedComment"> In effect udisks has been unmaintained for ages. I've reported several bugs that could well be security holes upstream (writes through null pointers, writes through uninitalized, pointers, the code quality is really quite dire). Not one has ever got a response.<br> </div> Mon, 04 Mar 2013 15:27:58 +0000 Can't disable unused filesystems https://lwn.net/Articles/540969/ https://lwn.net/Articles/540969/ cortana <div class="FormattedComment"> udisks does provide properties you can use to prevent volumes from being mounted by and/or shown to the user, so this should be possible. The churn is a huge pain in the arse, however. And I see it's about to get worse, since udisks is being replaced by udisks2... :/<br> </div> Sun, 03 Mar 2013 15:42:10 +0000 Can't disable unused filesystems https://lwn.net/Articles/540919/ https://lwn.net/Articles/540919/ jmorris42 <div class="FormattedComment"> Yea, /etc/filesystems is documented as only being consulted for -t auto or leaving the switch off entirely. If you explicitly specify a filesystem you expect the system to do what you told it.<br> <p> But the key point remains, after several replies nobody can point to a way to actually solve a problem that exists on all graphical desktops.<br> <p> udev is clearly not intended to be modified by the end user. It isn't documented, the files controlling it are written in a way to be hostile to manual editing and the entire subsystem has been churning for years.<br> <p> Simply stopping the modules from loading isn't a good solution either.<br> <p> You can't even reliably suppress the icons from appearing on a desktop. I once found a way to do it, it worked until the next Fedora.<br> </div> Sat, 02 Mar 2013 16:59:17 +0000 A story of three kernel vulnerabilities https://lwn.net/Articles/540782/ https://lwn.net/Articles/540782/ lopgok <div class="FormattedComment"> I think the SELinux is real security 'progress in a _mainline_ distro'.<br> <p> It is in the mainline kernel.<br> It is enabled by default in RHEL and fedora and perhaps elsewhere.<br> I heard it is even in the newest Android builds.<br> </div> Fri, 01 Mar 2013 17:56:17 +0000 they have the full intention of mounting it to see what is on it https://lwn.net/Articles/540524/ https://lwn.net/Articles/540524/ Wol <div class="FormattedComment"> Not at all.<br> <p> Assuming the automount works even if the screen is locked (as I get the impression is often the case), this is a perfect way of breaking into someone else's machine. If the exploit opens a root shell on a secret port, that machine is now owned ...<br> <p> So in that case, the user knows exactly what is on it. They want to see what's on the machine.<br> <p> So a confirmatory pop-up (as I get on my gentoo system) *is* a very effective security step.<br> <p> Cheers,<br> Wol<br> </div> Thu, 28 Feb 2013 21:20:10 +0000 A story of three kernel vulnerabilities https://lwn.net/Articles/540377/ https://lwn.net/Articles/540377/ geek <div class="FormattedComment"> "...for most of that time, it was assumed that the problems had been fixed."<br> Isn't that, in principle, a testable assumption? I'd be interested to know if there is a testing discipline around such an assumption, I suppose it isn't the only time this has occurred.<br> <p> Dave<br> <p> </div> Thu, 28 Feb 2013 06:40:04 +0000 Can't disable unused filesystems https://lwn.net/Articles/539773/ https://lwn.net/Articles/539773/ spender <div class="FormattedComment"> Grsecurity can do this. It happily prevents udisks from auto-loading modules for whatever filesystems on behalf of unprivileged users. It's unfortunate though that Linux is moving in this direction (of security decisions being made in userland brokers) as it hinders the ability to enforce more secure mandatory security policies.<br> <p> Grsecurity will also prevent mount from being able to load arbitrary kernel modules (it will be restricted to modules that register a filesystem).<br> <p> This is a subset of the full GRKERNSEC_MODHARDEN feature which prevents unprivileged users from being able to auto-load kernel modules, without having to implement a posteriori blacklists.<br> <p> -Brad<br> </div> Sun, 24 Feb 2013 15:40:59 +0000 Can't disable unused filesystems https://lwn.net/Articles/539754/ https://lwn.net/Articles/539754/ paulj <div class="FormattedComment"> Ah, so I'm not the only frustrated by lots of "disk" icons appearing in nautilus, that are to do with the system, and there not being any reasonably obvious way (either from UI or in /etc) to hide them?<br> <p> Arg!<br> </div> Sun, 24 Feb 2013 08:49:28 +0000 Can't disable unused filesystems https://lwn.net/Articles/539698/ https://lwn.net/Articles/539698/ cortana <div class="FormattedComment"> It might be possible to implement something like this today with udev rules... if you could set the UDISKS_SYSTEM_INTERNAL property on a disk based on the value of one of its partitions ID_FS_TYPE properties. However I don't know how well that would interact with more interesting disk layouts (e.g., NTFS filesystem inside a LUKS container only unlocked once the user has double-clicked on it in the GUI).<br> <p> As for /etc/filesystems and /proc/filesystems, these days mount itself only seems to consult them if '-t auto' is used (or '-t' is absent entirely) and if libblkid fails to identify the correct filesystem. So I get the feeling that /etc/filesystems is really a remnant of an obsolete feature that hasn't been used since kernel module autoloading went in.<br> </div> Sat, 23 Feb 2013 12:39:52 +0000 Can't disable unused filesystems https://lwn.net/Articles/539669/ https://lwn.net/Articles/539669/ jmorris42 <div class="FormattedComment"> Of course something else that would help if if Linux still had something resembling documented, knowable/controllable behavior. In the days of old /etc/filesystems declared which filesystems could be automatically detected and mounted, all others requiring an explicit mount with the -t switch to force detection of the filesystem.<br> <p> That file still exists of course, and the mount command will still honor it when issued from a command line; but it is ignored by graphical desktops. And this defect is undocumented and if filed as a bug would be instantly closed as NOTABUG.<br> <p> For example the machine I'm typing on dual boots Win7 and has an NTFS filesystem for it. Despite efforts to suppress it, it shows an icon on my desktop and if I right click it the desktop environment happily offers to mount it and it will succeed. Meanwhile /etc/filesystems is still the stock one supplied by Fedora. It lists vfat, hfs and hfsplus (why) but does not mention ntfs.<br> <p> In a sane world a Linux desktop would not automatically mount rare filesystems, better still it would honor /etc/filesystems so the user could control it. Just how many users need hfs support? On a removable device? Close enough to zero it should default to no. These days ext[234],vfat,ntfs,iso9660 and udf probably should default to supported with everything else off.<br> </div> Fri, 22 Feb 2013 23:13:22 +0000 A story of three kernel vulnerabilities https://lwn.net/Articles/539572/ https://lwn.net/Articles/539572/ ortalo <div class="FormattedComment"> Am I mistaken or don't we have every other year a report showing that linux kernel security bugs are fixed very slowly? It started approximately since linux itself gained significant reputation in that area against proprietary operating systems (so nearly forever).<br> I think it's FUD. Admittedly that's an uninformed comment because I am so convinced of that, that I do not even take the time to read the reports in question anymore...<br> But I'd like to outline something factual: I see 2 CVE ids here from 2009.<br> In 2009 only, there were over 5500 CVE ids. The evolution of the number of CVE entries since 2000 is, in my opinion, a much more interesting topic [1].<br> Now my question for Trustwave: who funded that research?<br> <p> Just my 2/5500 cents...<br> <p> [1] BTW, I have a graph of that data at <a href="http://rodolphe.ortalo.free.fr/COURS_SE_2012_r3.pdf">http://rodolphe.ortalo.free.fr/COURS_SE_2012_r3.pdf</a>, page 15, but everyone can grab it from cve.mitre.org <br> <p> </div> Fri, 22 Feb 2013 10:36:19 +0000 A story of three kernel vulnerabilities https://lwn.net/Articles/539554/ https://lwn.net/Articles/539554/ jtc <div class="FormattedComment"> 'The Trustwave "analysis" obviously has a severe bias and its sample size makes it a joke.'<br> <p> Not only is their analysis biased, but, if the zdnet summary of their report is to be believed, they've shown themselves to be incompetent:<br> <p> "Zero-day flaws — software vulnerabilities for which no patch is available — in the Linux kernel that were patched last year took an average of 857 days to be closed, Trustwave found. In comparison zero-day flaws in current Windows OSes patched last year were fixed in 375 days."<br> <p> The obvious implication is that this is a claim that the average of time to close for all zero-day defects in the Linux kernel is 3 years (versus 375 days for Windows). Obviously, an average cannot be calculated from 2 instances, which are very likely worst-case, out of many critical defects. Such miscalculation, of course, implies incompetence (or the zdnet summary is inaccurate). The criticism that these 2 cases took too long to fix is, perhaps, warranted, but nobody paying attention will conclude from their report that the implication of the headline ("Linux trailed Windows in patching zero-days in 2012...") is anything other than bullshit.<br> <p> Interestingly, at the end of the zdnet article is:<br> <p> "The Trustwave report says the number of critical vulnerabilities, as determined by the Common Vulnerability Scoring System (CVSS) assessment of factors like potential impact and exploitability, identified in the Linux kernel was lower than in Windows last year, with nine in Linux compared to 34 in Windows. The overall seriousness of vulnerabilities was also lower in Linux than Windows, with Linux having an average CVSS score of 7.68 for its vulnerabilities, compared to 8.41 for Microsoft."<br> <p> This might be viewed as evidence that Trustwave is not biased, but, unfortunately for them in light of their main (apparent) claim, not as evidence that they are not incompetent.<br> <p> </div> Fri, 22 Feb 2013 05:41:09 +0000 A story of three kernel vulnerabilities https://lwn.net/Articles/539519/ https://lwn.net/Articles/539519/ alonz The only setuid binary involved with using FUSE is "<tt>fusermount</tt>", which only opens <tt>/dev/fuse</tt> and immediately drops privilege. The filesystem handler itself runs as an unprivileged user. <p> So I, for one, really don't get your point. Thu, 21 Feb 2013 19:40:34 +0000 A story of three kernel vulnerabilities https://lwn.net/Articles/539513/ https://lwn.net/Articles/539513/ zlynx <div class="FormattedComment"> I'd rather have an ASN1 parser in there than yet another custom format. At least ASN1 is well defined and doesn't shift its meaning on different machine architectures.<br> </div> Thu, 21 Feb 2013 19:13:57 +0000 A story of three kernel vulnerabilities https://lwn.net/Articles/539395/ https://lwn.net/Articles/539395/ drag <div class="FormattedComment"> I am guessing that those numbers are the worst case scenario when it comes to the viewpoint of the attacker. I would expect that there are a significant number of things that can be done to improve the odds.<br> </div> Thu, 21 Feb 2013 16:20:15 +0000 A story of three kernel vulnerabilities https://lwn.net/Articles/539380/ https://lwn.net/Articles/539380/ alankila <div class="FormattedComment"> To inject some numbers to this claim, and unless I am badly mistaken, the failure chance is 99.999999%. Raising that number to the power of approximately 70 million yields around 50 % success probability. It is fundamentally a matter of chance, so 100% success can never be achieved, though something very close to it can be achieved, of course.<br> <p> In any case this sort of probabilities require means to fire the attack several times per second or it will probably take years of continuous attempting before succeeding. Unfortunately ptrace sounds like the sort of thing you can try thousands of times per second.<br> </div> Thu, 21 Feb 2013 15:03:03 +0000 A story of three kernel vulnerabilities https://lwn.net/Articles/539365/ https://lwn.net/Articles/539365/ Trou.fr <div class="FormattedComment"> Stuxnet used a vulnerability in the Windows shell (the so-called LNK vulnerability), not in the filesystem code.<br> <p> As for floppies, viruses spread mostly by running infected executables, not using vulns.<br> </div> Thu, 21 Feb 2013 11:55:13 +0000 A story of three kernel vulnerabilities https://lwn.net/Articles/539324/ https://lwn.net/Articles/539324/ corsac <div class="FormattedComment"> <a href="http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=blob;f=crypto/asymmetric_keys/x509_cert_parser.c;h=7fabc4c01993bd92e3fc159ba05ae92b1732f231;hb=HEAD">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;...</a><br> </div> Thu, 21 Feb 2013 06:16:30 +0000 A story of three kernel vulnerabilities https://lwn.net/Articles/539311/ https://lwn.net/Articles/539311/ draco <div class="FormattedComment"> There's nothing about signing stuff that requires ASN.1 or X.509. Also, it's entirely possible that userspace uses ASN.1/X.509 to get at the keys to sign with, but something else to carry the signature itself.<br> <p> If the kernel must parse ASN.1/X.509 to parse the signature for authentication...yikes, but that's not a requirement. (And even if they are, I hope it's a really limited implementation.)<br> </div> Thu, 21 Feb 2013 03:16:47 +0000 Filesystem vulnerabilities https://lwn.net/Articles/539301/ https://lwn.net/Articles/539301/ PaXTeam <div class="FormattedComment"> the CVE process has nothing to do with how fast a bug is fixed. it's only concerned with cataloging bugs, disclosure/fix/etc strategy is always up to the vendor/author. so if you had a problem with rushed fixes in the past, look no further than your own managers who forced you to do it.<br> </div> Thu, 21 Feb 2013 01:55:32 +0000 Filesystem vulnerabilities https://lwn.net/Articles/539251/ https://lwn.net/Articles/539251/ dgc <div class="FormattedComment"> <font class="QuotedText">&gt; Vendors seem not to consider filesystem vulnerabilities to be serious</font><br> <font class="QuotedText">&gt; (including Red Hat who I work for).</font><br> <p> Vendors take them extremely seriously, but there's lots more to the process than "OMG!!! Security Problem! World ends at 5pm if we don't have a fix by then!". As a filesystem developer (who co-incidentally works for Red Hat, too) I have fixed my fair share of fsfuzz related bug reports over the years.<br> <p> So, what's the real issue here? It's that most fuzzer "filesystem vulnerabilities" are either a simple denial-of-service (non-exploitable kernel crash), or are only possible to exploit when you *already have root* or someone does something stupid from a security perspective. However, once a problem is reported to the security process it is captured, and the security process takes over everything regardless of whether subsequent domain-expert analysis shows that the bug is security problem or not.<br> <p> <font class="QuotedText">&gt; For example OpenStack out of the box will mount untrusted guest</font><br> <font class="QuotedText">&gt; filesystems on the host kernel,</font><br> <p> This is a prime example of "doing something stupid from a security perspective". Virtualisation is irrelevant here - the openstack application is doing the equivalent of picking up a USB stick in the car park and plugging it into a machine on a secured network.....<br> <p> However, to really understand the situation from an fs developer POV you need to understand a bit of history and a bit about risk. That is, any change to filesystem format validation routines has risk of causing corruption or false detection of corruption, and hence you can seriously screw over the entire filesystem's user base with a bad fix.<br> <p> Think about it for a moment - a divide by zero crash on a specifically corrupted filesystem is simply not something occurs in production environments. However, the changes to the code that detects and avoids the problem is executed repeatedly by every single ext4 installation in existence. IOWs, the number of people that may be affected by the corrupted filesystem div0 problem is *exceedingly tiny*, while the number of people that could be affected by a bad fix is, well, the entire world.<br> <p> Then consider that the CVE process puts pressure on the developers to fix the problem *right now* regardless of any other factors. Hence the fixes tend to rushed, not well thought out, are only lightly tested and not particularly well reviewed. In the filesystems game, than means the risk of regressions or the fix not working entirely as intended is significant.<br> <p> In the past this risk was ignored for security fixes, and that's why we have a long history of needing to add more fixes to previous security fixes. We have proven that the risk of regressions from rushed fixes is real and it cannot be ignored. Hence -in this arena- the CVE process could be considered more harmful to users than leaving the problem unfixed while we take the usual slower, more considered release process. i.e. the CVE process (and measuring vendor performance with CVE open/close metrics) simply does not take into account that fixing bugs badly can be far worse for users than taking extra time to fix the bug properly. <br> <p> Vendors that do due diligence (i.e. risk assessment of such bugs outside of the security process) are more likely to correctly classify fuzz-based filesystem bugs compared to the security process. Hence we see vendors mitigating the risk of regressions by testing the filesystem fixes fully before releasing them rather than rushing out a fix just to close a CVE quickly.<br> <p> IOWs, -more often than not- vendors are doing exactly the right thing by their user base with respect to filesystem vulnerabilities. The vendors should be congratulated for improving on a process that had been proven to give sub-standard results, not flamed for it...<br> <p> -Dave.<br> </div> Thu, 21 Feb 2013 01:06:09 +0000 A story of three kernel vulnerabilities https://lwn.net/Articles/539286/ https://lwn.net/Articles/539286/ andrel <div class="FormattedComment"> Supposedly Stuxnet was transmitted using a USB key.<br> </div> Wed, 20 Feb 2013 23:59:25 +0000 A story of three kernel vulnerabilities https://lwn.net/Articles/539243/ https://lwn.net/Articles/539243/ raven667 <div class="FormattedComment"> There is far far far more than that when it comes to complex interfaces. Aside from the arbitrariness of ioctl there is bpf and GPU command validation as well as iptables and who knows what else that is passing complex data structures into the kernel.<br> </div> Wed, 20 Feb 2013 21:23:58 +0000 A story of three kernel vulnerabilities https://lwn.net/Articles/539238/ https://lwn.net/Articles/539238/ corsac <div class="FormattedComment"> And about support for signed modules: I'm sure everyone loves having an X509/ASN1 parser running in ring0.<br> </div> Wed, 20 Feb 2013 20:44:49 +0000 A story of three kernel vulnerabilities https://lwn.net/Articles/539237/ https://lwn.net/Articles/539237/ josh <div class="FormattedComment"> Just running in userspace doesn't necessarily give you an inherent security advantage, especially if running as the primary user on the system. However, many more facilities exist to isolate and sandbox userspace binaries to protect against exploits. For instance: take a kernel filesystem driver, port it to FUSE, and run the actual process that does filesystem parsing inside of a seccomp sandbox that only has permission to read and write the mounted device and respond to FUSE requests. Then, even if that filesystem parsing got exploited, the exploit can do very little to harm the system. It could crash, slow down filesystem accesses, serve up arbitrary file content (already possible if you control the filesystem image), or burn CPU, but it can't make arbitrary system calls and can't easily escalate privileges.<br> </div> Wed, 20 Feb 2013 20:33:32 +0000 A story of three kernel vulnerabilities https://lwn.net/Articles/539177/ https://lwn.net/Articles/539177/ bfields <div class="FormattedComment"> In the late eighties/early nineties I seem to recall infected floppy disks were the main (or at least a very common) vector for virus transmission.<br> <p> If people don't exchange data on usb keys as much as they used to on floppies, perhaps that wouldn't be as effective these days.<br> </div> Wed, 20 Feb 2013 16:24:30 +0000 A story of three kernel vulnerabilities https://lwn.net/Articles/539174/ https://lwn.net/Articles/539174/ drag <div class="FormattedComment"> Oh and as far as 'userspace vs kernelspace', since all this stuff requires root privileges to do, unless you want to depend entirely on GVFS and whatnot, then any exploit that gives you root access gives you kernel access. Pretty much same different, unfortunately.<br> </div> Wed, 20 Feb 2013 16:07:38 +0000 A story of three kernel vulnerabilities https://lwn.net/Articles/539172/ https://lwn.net/Articles/539172/ drag <div class="FormattedComment"> <font class="QuotedText">&gt; If you're saying that an exploit granting access to a user space program is just as dangerous as it having access to kernel space, I think most people would disagree with you.</font><br> <p> No.<br> <p> I am saying that taking a security problem that exists in kernel space and then trying to fix it by moving to a mixture of kernel space and userspace and throwing in a couple setuid root binaries isn't a silver bullet. <br> <p> Fuse requires kernel file system features as well as setuid root binaries to operate properly. Without granting users access to /dev/fuse you can't 'mount' fuse file systems. Just granting users the ability to use fuse is a security risk in itself. <br> <p> Now if you were to say that you wanted to use something like GVFS, which itself doesn't require any special privileges or fuse mounts or anything like that, then that's different. That is completely in a user account, but it's not POSIX compatible and requires programs to be GVFS aware.<br> </div> Wed, 20 Feb 2013 16:01:45 +0000 A story of three kernel vulnerabilities https://lwn.net/Articles/539163/ https://lwn.net/Articles/539163/ robert_s <div class="FormattedComment"> <font class="QuotedText">&gt;I don't see the benefit of using 'FUSE' from a security perspective. </font><br> <p> Well you'd better tell the authors of libguestfs then (largely RedHat) as security seems to be its main intention.<br> <p> If you're saying that an exploit granting access to a user space program is just as dangerous as it having access to kernel space, I think most people would disagree with you.<br> <p> The point is not whether or not the user wants to mount the device - let's take it for granted that they do, so confirmation is irrelevant. It's whether that USB stick that was just handed to them at a conference is able to directly exploit their kernel on insertion through a specially crafted filesystem.<br> <p> "Just fix"ing "the code" in this case means "always getting all filesystem code 100% right 100% of the time".<br> </div> Wed, 20 Feb 2013 14:48:32 +0000 A story of three kernel vulnerabilities https://lwn.net/Articles/539159/ https://lwn.net/Articles/539159/ drag <div class="FormattedComment"> I don't see the benefit of using 'FUSE' from a security perspective. <br> <p> FUSE still goes to through kernel file system interface, and then you have all the file system code, and the setuid fuse binaries and special permissions that the user has to have to access /dev/fuse.<br> <p> It seems to me to be a attempt to throw code and complexity to obsofgate (sp?) a potential security hole. It just seems to be a better to approach just to fix the code. <br> <p> Also I am pretty sure that if somebody plugs a device into a machine they have the full intention of mounting it to see what is on it. Having a 'ack' button may be useful in a case where you do not want a device mounted while you are away from the computer and the screen is locked, but besides that having a extra step the user must go through to mount it would serve little purpose. It may make people feel more comfortable or help people (like me) that tend to do odd things with flash file systems that precludes mounting them.<br> <p> This is the case were potentially some sort of 'anti-virus' code may be useful to validate the device before mounting it, but that seems to open up a whole new can of worms.<br> </div> Wed, 20 Feb 2013 14:31:32 +0000 A story of three kernel vulnerabilities https://lwn.net/Articles/539156/ https://lwn.net/Articles/539156/ Trou.fr <div class="FormattedComment"> well it's a "real" issue but it's nothing compared to others that have a wide security impact as in every script kiddie can pwn a webserver :<br> 1) outdated CMS with remote code execution (mostly PHP)<br> 2) easy execution of any executable<br> 3) ready to use exploit that works reliably as unprivileged user<br> <p> The HFS+ vuln is not exploitable in that case. While it can be used for "physical" attacks like the USB key, it is not usable remotely.<br> <p> _Thousands_ of servers have been compromised with that scenario :<br> 1) vulnerable webapp<br> 2) escalation to root using kernel vulnerability (or poor sysadmin)<br> 3) ssh backdoor to collect passwords<br> 4) compromise other hosts, goto 3<br> 5) use compromised servers as DDoS platforms, proxy, whatever...<br> </div> Wed, 20 Feb 2013 13:52:10 +0000 A story of three kernel vulnerabilities https://lwn.net/Articles/539155/ https://lwn.net/Articles/539155/ robert_s <div class="FormattedComment"> <font class="QuotedText">&gt;In an ideal world of course, it would be possible to run all filesystem drivers as FUSE modules or in kernel.</font><br> <p> Replying to myself - upon reading to the bottom of these comments it seems libguestfs can do this to some extent.<br> <p> Perhaps a security-conscious distribution should consider doing auto-mounting of any "removable" block devices through such a mechanism.<br> </div> Wed, 20 Feb 2013 13:39:31 +0000 A story of three kernel vulnerabilities https://lwn.net/Articles/539143/ https://lwn.net/Articles/539143/ robert_s <div class="FormattedComment"> Because the people who use rarely used filesystems don't want them to be fast?<br> <p> In an ideal world of course, it would be possible to run all filesystem drivers as FUSE modules or in kernel.<br> </div> Wed, 20 Feb 2013 12:48:38 +0000 Filesystem vulnerabilities https://lwn.net/Articles/539139/ https://lwn.net/Articles/539139/ rwmj <div class="FormattedComment"> Vendors seem not to consider filesystem vulnerabilities to be serious (including Red Hat who I work for). Yet they are very serious when you add virtualization into the mix.<br> <p> For example OpenStack out of the box will mount untrusted guest filesystems on the host kernel, so all you need to do is upload a malicious filesystem image to a public cloud in order to attack the host and any other VMs running on the same system.<br> <p> We (Red Hat) have worked to mitigate this by using libguestfs which adds several layers of protection between a malicious filesystem and the host:<br> <p> <a href="http://libguestfs.org/guestfs.3.html#security-of-mounting-filesystems">http://libguestfs.org/guestfs.3.html#security-of-mounting...</a><br> <p> But with sysadmins still using kpartx / loopback mounting, there's still a need to take fs vulnerabilities much more seriously.<br> </div> Wed, 20 Feb 2013 10:42:47 +0000 A story of three kernel vulnerabilities https://lwn.net/Articles/539138/ https://lwn.net/Articles/539138/ renox <div class="FormattedComment"> <font class="QuotedText">&gt; I concur with spender's remark, the vulnerabilities could have been selected to underline a real problem with security and not just metrics with a DoS nobody will ever trigger (the ext4 one is a joke).</font><br> <p> "could have been"? What about the HFS+ exploit?<br> As joey remarked above, it is a real issue..<br> By focusing on the ext4 DOS, you "forget" the other issue.<br> <p> <p> </div> Wed, 20 Feb 2013 10:30:52 +0000 A story of three kernel vulnerabilities https://lwn.net/Articles/539129/ https://lwn.net/Articles/539129/ josh <div class="FormattedComment"> I'd argue that rarely-used filesystems (90% of the "Miscellaneous Filesystems" menu in kconfig) ought to become FUSE modules running in a seccomp sandbox, having only the permissions they need to read or write the mounted device and respond to FUSE requests.<br> </div> Wed, 20 Feb 2013 09:54:46 +0000 A story of three kernel vulnerabilities https://lwn.net/Articles/539123/ https://lwn.net/Articles/539123/ epa <div class="FormattedComment"> Yes, they took a biased sample. But that's the thing about security: you cannot rely on the law of averages to help you. An attacker only needs to be lucky once. If Trustwave can cherry-pick three vulnerabilities which took a long time to fix, an attacker can do the same. So it is quite legitimate to criticize the state of security fixes based on one security hole left unpatched, even if there were a thousand others fixed promptly.<br> </div> Wed, 20 Feb 2013 09:17:01 +0000 A story of three kernel vulnerabilities https://lwn.net/Articles/539108/ https://lwn.net/Articles/539108/ error27 <div class="FormattedComment"> $ mount -o loop foo mnt<br> mount: only root can do that<br> <p> But otherwise yes, the fuzzer uses loop back filesystems for testing. The thing about USB sticks is that most distros automount them when you plug them in.<br> <p> Probably they should not automount less used filesystems.<br> </div> Wed, 20 Feb 2013 07:17:45 +0000 A story of three kernel vulnerabilities https://lwn.net/Articles/539109/ https://lwn.net/Articles/539109/ smurf <div class="FormattedComment"> Definitely.<br> </div> Wed, 20 Feb 2013 07:12:58 +0000