Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20130823054215.GA22947@hunt>
Date: Thu, 22 Aug 2013 22:42:15 -0700
From: Seth Arnold <seth.arnold@...onical.com>
To: oss-security@...ts.openwall.com
Subject: Re: [PATCH] implement privmode support in dash

On Thu, Aug 22, 2013 at 09:31:03PM -0600, Kurt Seifried wrote:
> On 08/22/2013 11:59 AM, Tavis Ormandy wrote:
> > Here is a related blog post on the topic
> > http://blog.cmpxchg8b.com/2013/08/security-debianisms.html
> > 
> > If you care about tracking vulnerabilities, the vmware issue is
> > called CVE-2013-1662.
> 
> Do we need one for Debian as well? Seems like a strong maybe.

I don't think so -- it isn't the shell at fault when a setuid program
fails to manage its privileges properly.

Incidentally, I'm curious to know how the vmware-mount problem was
discovered. Was it discovered because dash does not have bash's
mitigation in place? Or was it discovered via some other mechanism?

Regardless of the answer, it is probably worth using bash's mitigation
in dash, but I'm curious if we'll make discovering future bugs in setuid
programs more difficult to spot by happenstance by doing so.

Thanks

Download attachment "signature.asc" of type "application/pgp-signature" (491 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.