Re: (fwd) [FD] OpenBSD kernel relinking is not transactional and a local exploit exists

2023-06-20 Thread Tomasz Rola
On Mon, Jun 19, 2023 at 05:34:12PM -0600, Theo de Raadt wrote: > That writeup is bullshit. Ok, I see. -- Regards, Tomasz Rola -- ** A C programmer asked whether computer had Buddha's nature. ** ** As the answer, master did "rm -rif" on the programmer's home** ** directory. And then

Re: (fwd) [FD] OpenBSD kernel relinking is not transactional and a local exploit exists

2023-06-19 Thread Aaron Mason
On Tue, Jun 20, 2023 at 9:27 AM Tomasz Rola wrote: > > [REDACTED] > > https://marc.info/?l=openbsd-bugs=159074964523007=2 (noted lack of > idempotency) > https://marc.info/?l=openbsd-bugs=168688579123005=2 (noted lack of > integrity or provenance verification and the consumption of invalid >

Re: (fwd) [FD] OpenBSD kernel relinking is not transactional and a local exploit exists

2023-06-19 Thread Aaron Mason
Like Theo said, if an attacker has root on your system, having the kernel relink messed with is the least of your concerns. On Tue, Jun 20, 2023 at 9:27 AM Tomasz Rola wrote: > > This happened in my mailbox today. FD means "full disclosure" and is > publicly available mailing list. > > I repost

Re: (fwd) [FD] OpenBSD kernel relinking is not transactional and a local exploit exists

2023-06-19 Thread Theo de Raadt
That writeup is bullshit. If an attacker can replace files owned by root, they can replace other files rather than these files. Why replace some .o files and depend on a future reboot, I dunno, replacing ssh, or ksh, some things in /etc, or tens of thousands of other files? OR, why not replace

(fwd) [FD] OpenBSD kernel relinking is not transactional and a local exploit exists

2023-06-19 Thread Tomasz Rola
This happened in my mailbox today. FD means "full disclosure" and is publicly available mailing list. I repost onto misc because if this is a real cat, seems it is out of the bag already. Other than being subscribed to FD, I have no connection. - Forwarded message from "Schech, C. W.