LWN: Comments on "A local root kernel vulnerability" https://lwn.net/Articles/863586/ This is a special feed containing comments posted to the individual LWN article titled "A local root kernel vulnerability". en-us Sat, 27 Sep 2025 17:46:10 +0000 Sat, 27 Sep 2025 17:46:10 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net A local root kernel vulnerability https://lwn.net/Articles/864212/ https://lwn.net/Articles/864212/ wtarreau <div class="FormattedComment"> <font class="QuotedText">&gt; I understand the kernel people are worried that mentioning known exploits for some bugs would give people a false sense of security about other ones, but I think that&#x27;s a highly questionable argument. If you&#x27;re fixing a known exploit, let people know!</font><br> <p> It&#x27;s not that much of a questionable argument, as I&#x27;ve already heard coworkers say &quot;this afternoon I&#x27;ll have to check if there are any glibc CVEs and backport fixes&quot;. I&#x27;ve heard that at customers&#x27; too. And I&#x27;m pretty sure that this horrible practice is extremely common. You can repeat as much as you want that lack of report doesn&#x27;t mean absence, but no, people stick to this as if they were doing the minimum needed to avoid being blamed.<br> <p> There might be something doable though. In haproxy we classify bugs in 4 levels of severity: minor (easy to work around, or minimal impact that can be ignored), medium (cannot easily ignore, may require non-trivial workaround or to temporarily disable a seldom used feature), major (severe impact such as a crash, no practical workaround without a total loss of important feature or severe performance regression), critical (like major but remotely triggerable). For each stable version we provide the number of bugs in each category. This instantly provides a good level of estimate about the importance of upgrading or not. A lot of users don&#x27;t upgrade if they don&#x27;t see a major or critical one, and are not facing production issues, and I think that&#x27;s OK, because they simply trust the developers&#x27; feelings about the bugs that were fixed.<br> <p> In the kernel we could possibly do the same. I really don&#x27;t care if a known exploit exists quite frankly. However knowing that a nasty bug can cause some memory corruption already means that someone can trigger it to render my system unstable, and possibly gain extra privileges. Whether the bug finder was interested in working on an exploit or not is irrelevant there, and someone else might perfectly do later. And for the users, knowing that &quot;pretty bad bugs&quot; were fixed compared to another version which only fixed minor ones such as wifi reconnection issues, it useful. All this is not about security, just severity. However security also depends on severity.<br> <p> </div> Sat, 24 Jul 2021 10:14:32 +0000 A local root kernel vulnerability https://lwn.net/Articles/864017/ https://lwn.net/Articles/864017/ geuder Ah, <code>sudo lsns -t user</code>. I probably knew that one day. </p> And I was so proud about my oneliner :) Thu, 22 Jul 2021 17:41:39 +0000 A local root kernel vulnerability https://lwn.net/Articles/864011/ https://lwn.net/Articles/864011/ jezuch <div class="FormattedComment"> <font class="QuotedText">&gt; Or we could assign numbers to those well-known arguments. Then it would go:</font><br> <font class="QuotedText">&gt; Alice: 136!</font><br> <font class="QuotedText">&gt; Bob: 155!</font><br> <font class="QuotedText">&gt; Alice: 136!</font><br> <p> Even that idea isn&#x27;t new<br> <p> <a href="https://en.wikipedia.org/wiki/The_Futurological_Congress">https://en.wikipedia.org/wiki/The_Futurological_Congress</a><br> <p> &quot;&quot;&quot;<br> The conference itself is no less absurd. Papers and presenters are too numerous to allow for full presentations. Instead, papers are distributed in hard copy and speakers call out paragraph numbers to call attention to their most salient points.<br> &quot;&quot;&quot;<br> </div> Thu, 22 Jul 2021 16:06:18 +0000 A local root kernel vulnerability https://lwn.net/Articles/863941/ https://lwn.net/Articles/863941/ immibis <div class="FormattedComment"> Perhaps we could label them as Common Vindictive Exchanges, and we could number them with the year they were introduced and a yearly resetting sequence number, such as CVE-2021-0001<br> </div> Thu, 22 Jul 2021 10:20:53 +0000 A local root kernel vulnerability https://lwn.net/Articles/863912/ https://lwn.net/Articles/863912/ grawity <div class="FormattedComment"> <font class="QuotedText">&gt; On my current pretty fat Arch desktop I have uses them for sandboxing, as does :</font><br> <p> Uhh. Thanks, middle-click paste or something.<br> </div> Thu, 22 Jul 2021 04:34:20 +0000 A local root kernel vulnerability https://lwn.net/Articles/863911/ https://lwn.net/Articles/863911/ grawity <p>Just like Firefox, both Chrome and Flatpak use them for sandboxing (the latter using the bwrap tool under the hood). Upowerd actually does not use namespaces on its own, but its <em>systemd unit</em> enables <code>PrivateUsers=</code> as a generic "hardening" option.</p> <p>On my current pretty fat Arch desktop I have uses them for sandboxing, as does :</p> <pre> $ sudo lsns -t user NS TYPE NPROCS PID USER COMMAND 4026531837 user 262 1 root /usr/lib/systemd/systemd --system --deserialize 44 4026532633 user 1 880 root /usr/lib/upowerd 4026532706 user 1 2920 grawity /opt/google/chrome/nacl_helper 4026532707 user 18 2919 grawity /opt/google/chrome/chrome --type=zygote 4026532720 user 1 80470 grawity xdg-dbus-proxy --args=40 4026532804 user 2 80475 grawity bwrap --args 38 gnome-text-editor </pre> Thu, 22 Jul 2021 04:33:38 +0000 A local root kernel vulnerability https://lwn.net/Articles/863873/ https://lwn.net/Articles/863873/ geuder Thanks for the detailed reply. I had missed the change between Debian 10 and 11. <p> I wasn't aware that so many applications use user namespaces these days. <p> On my current pretty minimalistic Xubuntu desktop I have: <p> <code> <pre> $ ps $(sudo find /proc/ -path "*/ns/user" -exec ls -l {} + | grep -v 4026531837 | sed 's,.*/proc/\([0-9]*\)/.*,\1,' | sort -u) PID TTY STAT TIME COMMAND 1488 ? Ssl 0:00 /usr/lib/upower/upowerd 1917 ? Sl 0:02 /usr/lib/firefox/firefox -contentproc -childID 1 -isForBrowser -prefsLen 1 -prefMapSize 240473 -jsInit 285176 -parentBuildID 20210705185941 -appdir /usr/lib/firefox/browser 1755 true tab 1983 ? Sl 0:04 /usr/lib/firefox/firefox -contentproc -childID 2 -isForBrowser -prefsLen 5013 -prefMapSize 240473 -jsInit 285176 -parentBuildID 20210705185941 -appdir /usr/lib/firefox/browser 1755 true tab 2042 ? Sl 0:07 /usr/lib/firefox/firefox -contentproc -childID 3 -isForBrowser -prefsLen 5673 -prefMapSize 240473 -jsInit 285176 -parentBuildID 20210705185941 -appdir /usr/lib/firefox/browser 1755 true tab 2098 ? Sl 0:32 /usr/lib/firefox/firefox -contentproc -childID 4 -isForBrowser -prefsLen 8137 -prefMapSize 240473 -jsInit 285176 -parentBuildID 20210705185941 -appdir /usr/lib/firefox/browser 1755 true tab 2199 ? Sl 0:00 /usr/lib/firefox/firefox -contentproc -parentBuildID 20210705185941 -prefsLen 8863 -prefMapSize 240473 -appdir /usr/lib/firefox/browser 1755 true rdd 2202 ? Sl 0:09 /usr/lib/firefox/firefox -contentproc -childID 5 -isForBrowser -prefsLen 8863 -prefMapSize 240473 -jsInit 285176 -parentBuildID 20210705185941 -appdir /usr/lib/firefox/browser 1755 true tab 2470 ? Sl 0:11 /usr/lib/firefox/firefox -contentproc -childID 7 -isForBrowser -prefsLen 9453 -prefMapSize 240473 -jsInit 285176 -parentBuildID 20210705185941 -appdir /usr/lib/firefox/browser 1755 true tab 2555 ? Sl 0:00 /usr/lib/firefox/firefox -contentproc -childID 8 -isForBrowser -prefsLen 9453 -prefMapSize 240473 -jsInit 285176 -parentBuildID 20210705185941 -appdir /usr/lib/firefox/browser 1755 true tab </pre> </code> I know <code>podman</code> uses them, too, but there is no container running now. Wed, 21 Jul 2021 18:40:16 +0000 A local root kernel vulnerability https://lwn.net/Articles/863728/ https://lwn.net/Articles/863728/ smcv <div class="FormattedComment"> <font class="QuotedText">&gt; Didn&#x27;t the known exploit require an unprivileged user namespace? I thought they were not supported in the Debian kernel.</font><br> <p> In Debian &lt;= 10 they&#x27;re disabled by default and require special configuration.<br> <p> In Debian &gt;= 11 they&#x27;re enabled by default, because applications that do sandboxing (notably web browsers) and container tools (notably podman and toolbox) increasingly require them, but can be disabled with special configuration (at the cost of breaking those applications and tools).<br> <p> A side benefit is that we no longer require a setuid-root executable to enter a useful container environment (notably bwrap for Flatpak, WebKitGTK, GNOME thumbnailers, Steam games, etc., and schroot for unprivileged Debian package builds).<br> <p> It&#x27;s a security trade-off: disabling unprivileged creation of user namespaces mitigates vulnerabilities like this one, but enabling unprivileged creation of user namespaces can reduce various other attack surfaces, as well as providing more functionality.<br> </div> Wed, 21 Jul 2021 12:59:46 +0000 A local root kernel vulnerability https://lwn.net/Articles/863725/ https://lwn.net/Articles/863725/ epa <div class="FormattedComment"> Surely you make the commit, with informative commit message, and then push it to a public git server at the moment of the coordinated release? If you&#x27;re working with others who are also under embargo, and want to get new kernel packages ready in advance of the release date, you can share your git repository with them privately.<br> <p> Right now we seem to have the worst of both worlds: the information on the vulnerability gets leaked before the disclosure date, because anyone with enough time and skill can review the diffs. Yet once the bug is disclosed and it should be straightforward to see which security fixes have been included in a tree, you have to deal with deliberately vague commit messages.<br> </div> Wed, 21 Jul 2021 10:29:41 +0000 A local root kernel vulnerability https://lwn.net/Articles/863724/ https://lwn.net/Articles/863724/ NAR <i>"Why not say clearly "this is an exploitable security bug" instead of pussyfooting around? "</i> <p> Because they have(?) to do the commit <b>before</b> the coordinated release date. Wed, 21 Jul 2021 10:07:35 +0000 A local root kernel vulnerability https://lwn.net/Articles/863717/ https://lwn.net/Articles/863717/ oldtomas <div class="FormattedComment"> It would be nice if people wouldn&#x27;t start a well-known discussion as if it were new. Each and every time.<br> <p> Positions are known by now. Without an all-new argument, they don&#x27;t seem bound to change. Perhaps it&#x27;s time to find a way to get along with this difference, instead of rehashing ad nauseam.<br> <p> Or we could assign numbers to those well-known arguments. Then it would go:<br> <p> Alice: 136!<br> Bob: 155!<br> Alice: 136!<br> ...<br> </div> Wed, 21 Jul 2021 08:31:51 +0000 A local root kernel vulnerability https://lwn.net/Articles/863714/ https://lwn.net/Articles/863714/ vegard <div class="FormattedComment"> The linked advisory seems to name the vulnerability &quot;Sequoia&quot;.<br> </div> Wed, 21 Jul 2021 07:46:54 +0000 A local root kernel vulnerability https://lwn.net/Articles/863709/ https://lwn.net/Articles/863709/ pbonzini <div class="FormattedComment"> On a locked down system (secure boot), even if something required root it would be a privilege escalation.<br> </div> Wed, 21 Jul 2021 06:24:34 +0000 A local root kernel vulnerability https://lwn.net/Articles/863708/ https://lwn.net/Articles/863708/ geuder <div class="FormattedComment"> Didn&#x27;t the known exploit require an unprivileged user namespace? I thought they were not supported in the Debian kernel. Or do I remember that wrong? I have no Debian kernel handy to try.<br> <p> The article says Debian would be exploitable.<br> </div> Wed, 21 Jul 2021 06:19:23 +0000 Commit messages https://lwn.net/Articles/863691/ https://lwn.net/Articles/863691/ roc <div class="FormattedComment"> Black hats are watching Linux commits and doing their own analysis of exploitability. Given that, there is usually no harm in explicitly saying in the commit message &quot;this fixes an exploitable security bug&quot;, and that would make the priority of fixing this clear to everyone.<br> <p> I can see a case for being vague when it&#x27;s very nonobvious that the bug is exploitable. But that should be a high bar.<br> <p> </div> Wed, 21 Jul 2021 00:01:22 +0000 A local root kernel vulnerability https://lwn.net/Articles/863690/ https://lwn.net/Articles/863690/ roc <div class="FormattedComment"> Why not say clearly &quot;this is an exploitable security bug&quot; instead of pussyfooting around? That makes the priority of the fix clear to all possible downstream consumers.<br> <p> For sure there are multiple black hats watching the commit logs closely already. Being deliberately vague in the commit message doesn&#x27;t stop attacks and only muddies the waters for people who don&#x27;t watch so closely.<br> </div> Tue, 20 Jul 2021 23:58:27 +0000 A local root kernel vulnerability https://lwn.net/Articles/863677/ https://lwn.net/Articles/863677/ Duncan <div class="FormattedComment"> Come on. The commit message includes the &quot;buffer&quot; keyword along with &quot;avoids int overflow pitfalls&quot;. Particularly in kernel context how can that *not* be a &quot;bug with security implications&quot;? Seems they effectively &quot;came right out and said it&quot; to me.<br> <p> Keeping in mind that the commit and therefore by definition the commit message was pre-disclosure (if not by much), in what way would a &quot;perfect&quot; commit message have differed?<br> </div> Tue, 20 Jul 2021 21:36:21 +0000 A local root kernel vulnerability https://lwn.net/Articles/863675/ https://lwn.net/Articles/863675/ khim True, but if we are talking not about accidents, but about crafty attacks… systems where you can create such are not huge by today's standards. Big, but not huge. Tue, 20 Jul 2021 21:05:18 +0000 A local root kernel vulnerability https://lwn.net/Articles/863667/ https://lwn.net/Articles/863667/ fenncruz <div class="FormattedComment"> No catchy name? Or a website? Clearly it can&#x27;t be that serious if it hasn&#x27;t been branded.<br> </div> Tue, 20 Jul 2021 20:20:08 +0000 A local root kernel vulnerability https://lwn.net/Articles/863662/ https://lwn.net/Articles/863662/ tlamp <blockquote>Correction: The commit predates the advisory e-mail (duh, sorry), but it should've added a proper summary and an honest rationale.</blockquote> Only because it was disclosed properly, see the timeline of the advisory: <pre> ======================================================================== Timeline ======================================================================== 2021-06-09: We sent our advisories for CVE-2021-33909 and CVE-2021-33910 to Red Hat Product Security (the two vulnerabilities are closely related and the systemd-security mailing list is hosted by Red Hat). 2021-07-06: We sent our advisories, and Red Hat sent the patches they wrote, to the linux-distros@openwall mailing list. 2021-07-13: We sent our advisory for CVE-2021-33909, and Red Hat sent the patch they wrote, to the security@kernel mailing list. 2021-07-20: Coordinated Release Date (12:00 PM UTC). </pre> Tue, 20 Jul 2021 20:01:15 +0000 A local root kernel vulnerability https://lwn.net/Articles/863631/ https://lwn.net/Articles/863631/ rgmoore <blockquote>It's very hard to draw a line between "regular bugs" and "bugs with security implications". </blockquote> <p>Yes and no. It's true that it's difficult to exclude security implications from "regular bugs"; there's always a possibility a sufficiently clever attacker could find a way to exploit them. But it would be good to come right out and say it when there's a known exploit. I understand the kernel people are worried that mentioning known exploits for some bugs would give people a false sense of security about other ones, but I think that's a highly questionable argument. If you're fixing a known exploit, let people know! Tue, 20 Jul 2021 17:21:08 +0000 A local root kernel vulnerability https://lwn.net/Articles/863642/ https://lwn.net/Articles/863642/ darwi <div class="FormattedComment"> Correction: The commit predates the advisory e-mail (duh, sorry), but it should&#x27;ve added a proper summary and an honest rationale.<br> </div> Tue, 20 Jul 2021 17:08:26 +0000 A local root kernel vulnerability https://lwn.net/Articles/863637/ https://lwn.net/Articles/863637/ darwi <div class="FormattedComment"> Fix all the bugs, sure. But don’t intentionally deteriorate the commit log of critical security fixes to hide their main rationale….<br> <p> Compare the advisory text against the commit log. Whom are we kidding? There should’ve been, at least, a “Link: ” tag in the commit log pointing to the advisory. But no, let’s hide our tracks instead….<br> </div> Tue, 20 Jul 2021 17:01:34 +0000 A local root kernel vulnerability https://lwn.net/Articles/863634/ https://lwn.net/Articles/863634/ ccezar <div class="FormattedComment"> Well, the total path length exceeding 1GB is not, how to say, normal thing. <br> </div> Tue, 20 Jul 2021 16:50:24 +0000 A local root kernel vulnerability https://lwn.net/Articles/863627/ https://lwn.net/Articles/863627/ bpearlmutter <div class="FormattedComment"> It&#x27;s very hard to draw a line between &quot;regular bugs&quot; and &quot;bugs with security implications&quot;. Very often, bugs that were thought to not have security implications turn out to be exploitable. It&#x27;s also not a very interesting endeavor. So they decided to just punt on it: fix all the bugs, and let others decide which to back-port.<br> </div> Tue, 20 Jul 2021 16:11:02 +0000 Commit messages https://lwn.net/Articles/863626/ https://lwn.net/Articles/863626/ proski <div class="FormattedComment"> Do you have a specific suggestion how to handle such issues better? It would be interesting to explore alternatives.<br> </div> Tue, 20 Jul 2021 15:41:42 +0000 A local root kernel vulnerability https://lwn.net/Articles/863620/ https://lwn.net/Articles/863620/ darwi <div class="FormattedComment"> It is really sad that, in this day and age, linux kernel security fixes commit logs are still intentionally written to &quot;hide things under the rug.&quot;<br> </div> Tue, 20 Jul 2021 15:18:50 +0000 A local root kernel vulnerability https://lwn.net/Articles/863619/ https://lwn.net/Articles/863619/ rahulsundaram <div class="FormattedComment"> It would be nice if the Linux kernel developers transparently communicate in their commit messages if the commit was intended to resolve a known security issue.<br> </div> Tue, 20 Jul 2021 15:12:03 +0000