Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20250516163157.BA80D8564D@mail.netbsd.org>
Date: Fri, 16 May 2025 16:31:56 +0000
From: Taylor R Campbell <riastradh@...BSD.org>
To: oss-security@...ts.openwall.com
Subject: Re: screen: Multiple Security Issues in Screen (mostly
	affecting release 5.0.0 and setuid-root installations)

> Date: Fri, 16 May 2025 11:34:29 -0400
> From: Eli Schwartz <eschwartz@...too.org>
> 
> On 5/16/25 11:01 AM, Jan Schaumann wrote:
> > I think it's useful to clarify here that NetBSD does
> > _not_ ship with GNU screen(1) at all.  NetBSD's
> > third-party package manager pkgsrc[1] includes
> > screen(1), allowing users to install additional
> > software on top of the base OS.
> > 
> > That package as included in _pkgsrc_ was installed
> > setuid[2], but a NetBSD base installation does not
> > include that package.  (NetBSD happens to include
> > tmux(1) _in the base OS_, but not screen(1).)
> > 
> > This distinction between a base OS and add-on software
> > that is optionally available for users to choose tends
> > to cause confusion for some people, so I figured
> > it's worth noting.
> 
> This is a nonsensical claim, but if I accept it as stated then I will
> counter-assert that zero (0) Linux distros are vulnerable as they don't
> preinstall screen in the base OS.
> 
> The definition of "the NetBSD base installation" is "nobody uses it".
> People use computing devices in order to run software on it. You cannot
> consider your OS in a bubble and go "well ackshually it's perfectly
> secure unless you use the builtin software to install official software,
> but we don't support that as a secure option".

It is not nonsensical, and it is not the inconsequential pedantry you
are suggesting.  Please consider avoiding sarcastic disparagement when
publicly discussing the factual matters of security reports.

The report says that `NetBSD 10.1' is affected.  This is not quite
right, _and it matters_ even if you set aside the fact that NetBSD
10.1 itself (which does ship tmux!) does not ship screen, because:

(a) the same pkgsrc packages are available on, e.g., NetBSD 9.x (which
    is not EOL); and

(b) pkgsrc is used on platforms other than NetBSD, including macOS,
    SmartOS, and various Linux distributions (e.g., for unprivileged
    use on HPC clusters where it is more flexible and up-to-date than
    the Linux distribution's package manager).

That is why it would be more accurate for the report to say
`pkgsrc-2025Q1', not `NetBSD 10.1'.

All that said, I think any further discussion of this point -- and any
other distributor-specific matters -- can reasonably be taken off-list
to keep the thread focussed on the details of the screen
vulnerabilities themselves.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.