Received: by 2002:ab2:6f44:0:b0:1fd:c486:4f03 with SMTP id l4csp45640lqq; Wed, 12 Jun 2024 16:12:29 -0700 (PDT) X-Forwarded-Encrypted: i=2; AJvYcCUB6eRk0HLHOWmvbdfhYbHcUDcGW5omeTFnbUps56L9vdewD4pkJp4hXXlLKKcV40g57MDFusFDJrvKR467xuHPA929+Zqxs2KisHTGiQ== X-Google-Smtp-Source: AGHT+IFm6U+BbiTMG9SbVO9WWnWNnY1+pky/uMRnmHaoCveE48Ld93nP9AWU0rxn4ARHY3WY6+Hw X-Received: by 2002:a17:907:1186:b0:a6e:f793:461f with SMTP id a640c23a62f3a-a6f47fad613mr203231566b.38.1718233949204; Wed, 12 Jun 2024 16:12:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1718233949; cv=none; d=google.com; s=arc-20160816; b=Vc28Jj86jAyuf6RPBshg1cxqxW4t7SFsOxCiVUjWZahzfAIVOc8mSUbXW9HRWQiMm3 GRMjd71Yjfk+GiqgKAYPgoQwWyRah9Ck8Jait+7Q8q24t+qClQ0mUNcTZzxP+lDLGZ6e lHiaTGHEQMPVkhJXOIzEPb86MUmbA41J3elgSi3elV2U6VgbylYv2KwjEO6kwS3DXcXC cGzv4rqN2GA4D3SkBoydbNZPScsp/KCteBSiLgAFERYpzS1FMd0L6p+9u5bf7GXYlMwp 154RTZ97Ux70qtJoIYNJTglqLAqO9VDvjborobLAMl0scARjiKq6fQlXK3enG6sjYK+M RO1w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=subject:content-transfer-encoding:in-reply-to:from:content-language :references:to:user-agent:mime-version:date:message-id :dkim-signature:delivered-to:reply-to:list-id:list-subscribe :list-unsubscribe:list-help:list-post:precedence:mailing-list; bh=xK6YOhwO6HlpvIOhtszKdBrT4GIF4S1XntiuVsU4HlU=; fh=9jsPTyo6edd9xvAeG+KFFrRrXMmgB/RdwUKOrvy9dcA=; b=yWEhpen0bxKUHCDUatkfrjaVdJRZOEl+2XDW1vtAm8PJcdLmYjQ7W6u/Cp2WdF4ZI4 L+q+WKlg/w1Jl4aN8EynIXEJfbmmdaPwc1C1ZldNqP6BOp19QC6oGZXHAT12hq2FStBp JntxsFoluBahvUq39zXOpSTyqO/e+SNXOczs7SqKjxpJDFb0Kh6ZhqTtqR7jUEo/7vQ/ NypMe+UhLIZHA99VYugLd+Z/IibHCjkGFyeniQAb3zXxVz4HAr/o0r5fLB4LCzQsN2Uz Dr6xs5tNGe+Z9UiL5BSop5lbFkRtxy756C0R5OFqIENIvtnf+BFk1n6I6XBIUtzNMSnC kwdA==; dara=google.com ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@gmail.com header.s=20230601 header.b=J9oNA9SE; spf=pass (google.com: domain of oss-security-return-30193-linux.lists.archive=gmail.com@lists.openwall.com designates 193.110.157.125 as permitted sender) smtp.mailfrom="oss-security-return-30193-linux.lists.archive=gmail.com@lists.openwall.com"; dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from second.openwall.net (second.openwall.net. [193.110.157.125]) by mx.google.com with SMTP id a640c23a62f3a-a6f56dd5b5esi4459966b.320.2024.06.12.16.12.29 for ; Wed, 12 Jun 2024 16:12:29 -0700 (PDT) Received-SPF: pass (google.com: domain of oss-security-return-30193-linux.lists.archive=gmail.com@lists.openwall.com designates 193.110.157.125 as permitted sender) client-ip=193.110.157.125; Authentication-Results: mx.google.com; dkim=fail header.i=@gmail.com header.s=20230601 header.b=J9oNA9SE; spf=pass (google.com: domain of oss-security-return-30193-linux.lists.archive=gmail.com@lists.openwall.com designates 193.110.157.125 as permitted sender) smtp.mailfrom="oss-security-return-30193-linux.lists.archive=gmail.com@lists.openwall.com"; dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (qmail 13885 invoked by uid 550); 12 Jun 2024 23:12:15 -0000 Mailing-List: contact oss-security-help@lists.openwall.com; run by ezmlm Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-ID: Reply-To: oss-security@lists.openwall.com Delivered-To: mailing list oss-security@lists.openwall.com Received: (qmail 13867 invoked from network); 12 Jun 2024 23:12:15 -0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1718233927; x=1718838727; darn=lists.openwall.com; h=content-transfer-encoding:in-reply-to:from:content-language :references:to:subject:user-agent:mime-version:date:message-id:from :to:cc:subject:date:message-id:reply-to; bh=xK6YOhwO6HlpvIOhtszKdBrT4GIF4S1XntiuVsU4HlU=; b=J9oNA9SEEkhKShimoZPYDj609ajanpOoOzcH6Zr++gojnBFYERlLe+P0T0eWKhZrXE kvXNT934XaoZwWTPgsHJYgRNSH8G95dz43RWrswvTAQA2Kj0csYu87+lPlvp3hzyMaiH +0XpV/TyELzQGOwEK1W2U1TzeA9OGv1/bJxE4mAKNvzuOCj0cA6GhntQx+daVT1kqA2O 1E1nEGBIC/PZx3ao8w0LvSkmJKOh8dEGLK6dLB2cK6eJePEo4IeX0vbiZAlnfA5ND3E3 NHcgkXu9j8EM5xSLm1WoSy1/BIcjv62PSNtfcbWzjbw3AL1nfFS8ZXHnXpHvwKOkBWgt rlGQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1718233927; x=1718838727; h=content-transfer-encoding:in-reply-to:from:content-language :references:to:subject:user-agent:mime-version:date:message-id :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=xK6YOhwO6HlpvIOhtszKdBrT4GIF4S1XntiuVsU4HlU=; b=BwYHOQXfkTkV8+djfYpYcXKwU0Ab3zMyJArIKKaBYgk/+8Mafgsx+w1H9cDKftVIkc i7uI0JRPXVOKE2Eu6coXaGbtesu1Rn16m/d4BAinVvllmcn4GOXxSCKWJnG6RUTJoLVm LIQandzDGHH0/8yDfHE1jvDDXfHmzj9otlftxG2WBh55JeDOKif9JJsohNr9YIIywuVb UL8UobdO6FfZGvH/e1NoUhIVYFpgBbliYaHT8SH3Tmac9SJwzIg2THIPfd0/hWkP36Bo C7HGhlGVkrLNiigIJuKyA+VV9QTa8dDeeOwke2IC9+s2251dNMBiIT2Dexi+glGg2G1v hukw== X-Gm-Message-State: AOJu0YxLp9wunYTpYWB7XhUJvIiw7115rHM7o0zSyAl79+099f+qQTN0 1KN5UkMo8kYgVjbUHNJRlR0h7VgQ0oZ9cW7wtoaN/n2r7paKBl1rT/OJig== X-Received: by 2002:a05:6808:d51:b0:3d2:2749:6a8a with SMTP id 5614622812f47-3d23dfaf567mr4045079b6e.4.1718233926645; Wed, 12 Jun 2024 16:12:06 -0700 (PDT) Message-ID: Date: Thu, 13 Jun 2024 09:12:02 +1000 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird To: oss-security@lists.openwall.com References: <28902b9a-3255-4bfe-a3c8-d0e08fb5f426@redhat.com> Content-Language: en-US From: Matthew Fernandez In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Subject: Re: [oss-security] Re: CVE-2024-35235 cups: Cupsd Listen arbitrary chmod 0140777 On 6/13/24 08:49, Tavis Ormandy wrote: > On 2024-06-11, Zdenek Dohnal wrote: >> ???????? Impact >> >> Given that cupsd is often running as root, this can result in the change >> of permission of any user or system files to be world writable. >> >> >> https://github.com/OpenPrinting/cups/commit/a436956f3 >> > > This is a pretty confusing description... if we accept the premise that an > attacker can somehow get root to run cupsd with a modified configuration > file (how???), then this patch doesn't seem sufficient. They can still > get root to unlink() an arbitrary file, no? Also with debug printing enabled `DEBUG_printf` does not save-and-restore `errno` and then does numerous things that can overwrite it. So presumably the `errno == ENOENT` branch is not reliable in this scenario.