|
Message-Id: <20141012210908.2F67F42E01B@smtpvbsrv1.mitre.org> Date: Sun, 12 Oct 2014 17:09:08 -0400 (EDT) From: cve-assign@...re.org To: kseifried@...hat.com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: perl-Razor-Agent logs to /razor-agent.log by default -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > https://bugzilla.redhat.com/show_bug.cgi?id=1058772 > https://bugzilla.redhat.com/show_bug.cgi?id=514979 > I'm inclined to not call this a DoS ... I can see situations where > this could be a problem. Maybe a CVE is needed for Red Hat's SELinux configuration - see below. As far as we can tell, this may be intentional behavior from the perspective of the upstream code. If the razorhome setting has a "" value, then the product doesn't use full directory paths and instead defaults to the current working directory (the / directory here): sub read_conf { ... # add full path to all config values that need them if ($self->{razorhome}) { foreach (qw( logfile ... Here, $self->{razorhome} has a value of "" because /root/.razor doesn't exist (SELinux had previously prevented its creation): sub find_home { ... my $dotrazor = '.razor'; ... $rhome = File::Spec->catdir("$ENV{HOME}", "$dotrazor"); ... if (-d $rhome) { ... $self->{razorhome} = $rhome; return 1; } ... $self->{razorhome} = ""; Are you interested in having a CVE assignment because this is a vulnerability in the default SELinux policy in various RHEL and Fedora versions? This seems to be an unusual situation in which denying write access to /root/.razor is what causes the vulnerability to exist. In other words, what is Red Hat's position on customer expectations for packages that function in an different/vulnerable way in SELinux Enforcing mode? Is it something like: - when Red Hat created the package, Red Hat was supposed to either ensure that the default SELinux policy was compatible with the filesystem access required by the package, or else develop a Red Hat custom patch to use a different part of the filesystem (e.g., maybe something under /var instead of /root/.razor in this case) Or is it something like: - every user is on their own to read setroubleshoot reports, determine why SELinux Enforcing mode results in vulnerable behavior for a package shipped by Red Hat, and then use semanage commands to get the behavior that they want ? Also, if it's undesirable for a mail-handling daemon to write to the top-level / directory, shouldn't the default SELinux policy have prevented that? Is it possible to construct a policy to express a position such as "new top-level files aren't ever allowed; every new file must be at least one level below the / level"? > it doesn't appear that the attacker can trigger faster growth Of course, there can't be a CVE assignment unless an attacker can trigger faster growth. (Unexpected resource consumption caused solely by the administrator's decision to install perl-Razor-Agent doesn't qualify for a CVE; that doesn't cross privilege boundaries.) It looks like attackers were supposed to be able to trigger faster growth simply by sending more mail, e.g., my $defaults = { debuglevel => "3", $self->log (3,"ignoring mail $obj->{id}, whitelisted by rule: $sh: $address"); $self->log (3,"mail $obj->{id} is ". ($obj->{spam} ? '' : 'not ') ."known spam."); Is this even possible, or does SELinux Enforcing mode disrupt normal operation enough that the code never reaches "$self->log (3" lines? - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJUOuziAAoJEKllVAevmvmsO/EIAKdSDaxll2KUh6I2MCM/cIYA K2R9LYksx/7gmKWXbFIvcEMeB5rTtA1A3a8lxZnI6ZnC14GTM+wL8nBJ5jrhVF6B xo4LXqOUUl5glx4Kd3JK44r6/viffTLtHdCwO3xNPN7HlRT6JlPFqK3ORecqYxnF F21rm4QxFoJqz37aFqJcTqjycjW/hwWaLyY+rpAAEZHfDtSVxP639UTucJ8xlYLg bJJ/bCKQh9rpafA8XsdxvX081fQYPiwEkvHvlCeN7U5G9+8yv4fcjHHlWN7IYlyL Kkq8NPRxaVhnv5U/frVOYDtyZPjn4B1eViSaLcAZVevzJHwUgLjPKnNUhNhP+KE= =H3rG -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.