2014-05-02 12:47 GMT+02:00 Lennart Poettering <mzerq...@0pointer.de>:

> On Wed, 30.04.14 19:56, Marcelo Ricardo Leitner (marcelo.leit...@gmail.com)
> wrote:
> > >This makes no sense. I mean, why would anyone bother with playing with
> > >systemd's binaries which (with the exceptio of s-d-v, see above) do not
> > >increase your set of capabilities when executed, if you have /bin/sh
> > >anyway which allows you to do whatever you want? If an attacker managed
> >
> > Don't ask me, ask when it happens (again)/when the next CVE comes
> > up. (and no, I'm not referring to systemd exclusively)
>
> No, what you are saying technically makes no sense. It really
> doesn't.


 <snip>


> If they manage to inject code into your
> system, then they manage to inject code into your system, that's
> it. They won.


It's not quite *that* simple.  The risk being discussed here is arbitrary
execution *of a command line* (e.g. string injection into system(3)), when
the attacker can run anything available via the namespace but not (yet)
upload their own binaries.

That risk *is* real.  OTOH until someone demonstrates a fully "productized"
application (i.e. suitable for automated setup, configuration management,
security updates) that includes none of: shell, python, coreutils, rpm,
wget, curl (... and many more tools), I don't think it's practical to spend
much effort trying to defend against it; running the suspect code (say, a
PHP application) under an isolated UID with limited privileges is a
reasonable compromise.
    Mirek
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Reply via email to