Re: FreeBSD Security Advisory FreeBSD-SA-06:25.kmem

看板FB_security作者時間19年前 (2006/12/07 00:47), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串8/10 (看更多)
Colin Percival napsal/wrote: >> A user in the "operator" group can read the contents of kernel memory. >> Such memory might contain sensitive information, such as portions of >> the file cache or terminal buffers. This information might be directly >> useful, or it might be leveraged to obtain elevated privileges in some >> way; for example, a terminal buffer might include a user-entered >> password. > > For what it's worth, there was a lot of debate about whether this deserved > an advisory: Members of the operator group are allowed (by default, at least) > to read raw disk devices, so being able to read kernel memory really isn't > very much of a privilege escalation. Even if the user with (unwanted) access memory has the read access to raw disk device we can't assume that all private data presend in memory are present on disk also. Especially when swap disabled. Paranoid application allocate non-swappable memory to store critical data also. There may be in-memory decrypted data (password supplied by user) that are never present on disk in raw form. Also, the PAM allow to configure the computer to authenticate users without passwords in master.passwd - but the correct and usable password still can be found in memory during authentication phase. Unless we can safelly assume that an user can't use the bug to acces data that isn't accesible via other interface, then we found new data channel. If we founded a new data channel where it should not be, then we found a point of possible data leakage. If data leak to someone who should not have acces to it, we found the security bug. There - someone has unwanted access to memory. It's security bug. The fact the user has the regular read-only access to raw disk device is irelevant unless all data avaiable in memory are avaiable on disk also. > I'd be interested to hear opinions from the FreeBSD community about whether > this sort of issue is one which anyone really cares about. Despite the fact that this bug don't create real security violation on any system under my supervision, I would like to know all informations that *may* affect security of a system. Including those you are not sure they really affect security or not. I'm administrator of system, I'm responsible for it's security, I will make final decision. I will ignore those information that doesn't claim security problem on my systems (but it still may claim security problem on other's system). Informations doesn't hurt. The lack of information may hurt. Dan _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #15TlGb00 (FB_security)
討論串 (同標題文章)
文章代碼(AID): #15TlGb00 (FB_security)