Post AiOwmsKHXAxXSmIU7c by brokenix@emacs.ch
(DIR) More posts by brokenix@emacs.ch
(DIR) Post #AiOwmsKHXAxXSmIU7c by brokenix@emacs.ch
2024-05-29T22:46:49Z
0 likes, 0 repeats
#doas : multiple security issuesBuffer overflow (privilege escalation to root)Broken UID parsing falls back to root (CVE-2019-15900)Incorrect group change behaviour (CVE-2019-15901)https://github.com/slicer69/doas/pull/23
(DIR) Post #AiOwmth0SAjNhXw9BI by ramin_hal9001@emacs.ch
2024-05-29T23:15:37Z
0 likes, 0 repeats
> "#doas : multiple security issues: Buffer overflow (privilege escalation to root) Broken UID parsing falls back to root (CVE-2019-15900),Incorrect group change behaviour (CVE-2019-15901)."@brokenix using Rust would probably have prevent buffer overflows bugs, but not the UID parsing or group change behavior.People who tried to sell me on "doas" often did by arguing that the simpler design and smaller code base was supposed to make it more secure. Well, security, as it turns out, is pretty damn hard.
(DIR) Post #AiOwmuo8JA1f9wHLvc by brokenix@emacs.ch
2024-05-29T23:54:32Z
0 likes, 0 repeats
@ramin_hal9001 and I am auth' ing with doas and ssh_auth keys ,on nixos , that's getting tricky I ll try chroot
(DIR) Post #AiOwmvZHTrjvWAL0Pw by screwtape@mastodon.sdf.org
2024-05-30T00:07:00Z
0 likes, 0 repeats
@brokenix @ramin_hal9001 1/2"before 6.2 on certain platforms other than OpenBSD. On platforms without strtonum(3), sscanf was used without checking for error"2/2" on certain platforms: Linux and possibly NetBSD) with a single setuid(2) call. "Nothing of value was lost
(DIR) Post #AiOwmw95KkNbJD5bE0 by screwtape@mastodon.sdf.org
2024-05-30T00:10:34Z
0 likes, 0 repeats
@brokenix @ramin_hal9001 imagine someone reading this thread then thinking that #doas and doas on its native #openbsd had had these problems, rather than the linux port(and possibly netbsd, sorry netbsd)
(DIR) Post #AiOwmwfLOoBSvGBMVU by ParadeGrotesque@mastodon.sdf.org
2024-05-30T00:53:51Z
1 likes, 0 repeats
@screwtape He he he:"On a side note, I'd like to point out that my testing shows this issue, keeping the group of the original user, appears to only affect Linux. On FreeBSD group permissions were already dropped, as they were on OpenBSD, and (I think) NetBSD. Linux was the odd one out for keeping the calling user's groups. And I think this patch is worthwhile to bring Linux into the fold so it is no longer an exception."