Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 12 Apr 2016 09:49:37 +0200
From: Sebastian Krahmer <krahmer@...e.com>
To: oss-security@...ts.openwall.com
Cc: cve-assign@...re.org, dave@...lke.cc
Subject: CVE-Request for brltty auth bypass

Hi

brltty is using polkit to control access to system ressources
("Write to the braille display").
It is doing so by using the PID of the process connecting
to the server socket. This is racy. The unix polkit subject
is deprecated, but if its used, the UID should be specified
as well, so it doesnt get looked up in /proc.

I already contacted upstream (Cc) but so far no response.
You can find my (untested) proposed patch at:

https://bugzilla.suse.com/show_bug.cgi?id=967436

Its probably not the worst issue, but should be fixed
nevertheless.

Sebastian

-- 

~ perl self.pl
~ $_='print"\$_=\47$_\47;eval"';eval
~ krahmer@...e.com - SuSE Security Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ