On Tue, May 03, 2022 at 08:47:56AM -0700, Clayton Craft wrote: > Hi folks, > > > what is the story there? I don't believe any of those MS reports > > are actually (important) security issues, > > The issue is basically that microsoft and/or their customers are allowing > arbitrary code execution under a system user account (the same one that > normally > runs systemd-networkd). I can't speak for Debian, but other distros I've seen > restrict who can "own" the systemd-networkd service name on the system dbus > session to that user, so obviously if you allow that user to run arbitrary > code > then you're going to allow anything to bypass those restrictions.
That's my understanding and hence why I asked them to publish a correction within 4 business days that this is caused by local misconfiguration and not a result of undisclosed security vulnerabilities. > > That's important in this context because networkd-dispatcher derives paths to > scripts it runs based on the messages it receives on dbus for the > systemd-networkd service. So if something else can "own" that name on the bus > then it can (before the sanitation patch in the latest version) get > networkd-dispatcher to run things located elsewhere. > > I should have been sanitizing input from dbus, which networkd-dispatcher does > now. But again, in every other configuration I've seen, the user who is > sending > messages under that service is a dedicated system user who is only running > systemd-networkd. > > > also why was this being disclosed publicly rather than responsibly? > > It was disclosed responsibly, as far as I understand the "responsible > disclosure" process to be. They contacted me privately about a month ago about > it, giving me enough time to come up with something to address it (I'm not > paid > to work on this :D) They also gave me a script to reproduce it shortly after > contacting me, which (after a lot of effort) I was able to trigger it a couple > of times in a VM running Arch Linux, but only after doing things that I > shouldn't have been doing in the "real world" > (e.g. sudo -u systemd-network ./foo) So the way this usually goes is that distros also get notified, and fixes are held back until a date (well hour really) coordinated by the distros so everyone can release fixes at the same time, by way of contacting the distros mailing list (https://oss-security.openwall.org/wiki/mailing-lists/distros) or individual email. Given that you are just working on this in your spare time and had not had to deal with a CVE, I think MS should have at least helped ensure that this is being communicated properly. -- debian developer - deb.li/jak | jak-linux.org - free software dev ubuntu core developer i speak de, en
signature.asc
Description: PGP signature