Local users get to play root?

Chris Adams cmadams at hiwaay.net
Thu Nov 19 14:27:23 UTC 2009


Once upon a time, Richard Hughes <hughsient at gmail.com> said:
> 2009/11/19 Chris Adams <cmadams at hiwaay.net>:
> > Once upon a time, Ricky Zhou <ricky at fedoraproject.org> said:
> >> I might be wrong on this, but wouldn't the attacker need to trick
> >> yum/packagekit into using the malicious repo first?  I didn't think that
> >> was allowed for non-root users.
> >
> > 1.5 words: NetworkManager.  Think about it.
> 
> 2 words: Package signing.
> 
> If the key is different to the one that was preciously imported, you
> need the root password.

2 words: replay attack.

So there are no packages in releases/12/Everything that have privilege
escalation bugs?  All I have to do is wait for one to be found, and I
have a signed path to root.  Even if the package is fixed in updates, I
just have to have a custom updates repo without it.

-- 
Chris Adams <cmadams at hiwaay.net>
Systems and Network Administrator - HiWAAY Internet Services
I don't speak for anybody but myself - that's enough trouble.




More information about the fedora-devel-list mailing list