[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Closing a privilege escalation
From: |
Glenn Morris |
Subject: |
Re: Closing a privilege escalation |
Date: |
Wed, 25 Apr 2018 12:47:30 -0400 |
User-agent: |
Gnus (www.gnus.org), GNU Emacs (www.gnu.org/software/emacs/) |
This was previously discussed in bug#28618.
I think the discussion suffers from lack of a clear example, so let me
try to give one:
A normal (uncompromised) user account inadvertently installs a malicious
Emacs package that contains exploit code that waits to be run as root.
This user then sudos (to root) in such a way that HOME is not reset to
that of root. They then run Emacs, which executes the malicious package
code as root.
This entire class of exploit can be avoided by suitable sudo options
(always_set_home etc), but that doesn't necessarily mean that Emacs
should not do something about it.
It seems to me, that "if UID = 0, set user-init-file, user-emacs-directory
etc to those of root" is a simpler solution that the one you propose.
This effectively enforces the always_set_home feature of sudo in Emacs.
This may annoy some people, but you can't make the behaviour optional,
because then the bad code could disable it. Some might say that people
using sudo without set_home want the behaviour the way it is now, but
maybe we could argue that it is not always a conscious choice.
By the way, what about sudo called from Tramp? Let's suppose the
malicious package subverts the sudo syntax that is built-in to Emacs.
How to defend against that (ie people running sudo within Emacs)?
- Re: Closing a privilege escalation, (continued)
- Re: Closing a privilege escalation, Lars Ingebrigtsen, 2018/04/24
- Re: Closing a privilege escalation, Richard Stallman, 2018/04/25
- Re: Closing a privilege escalation, Lars Ingebrigtsen, 2018/04/26
- Re: Closing a privilege escalation, Lars Ingebrigtsen, 2018/04/26
- Re: Closing a privilege escalation, Richard Stallman, 2018/04/26
- Re: Closing a privilege escalation, Tim Cross, 2018/04/26
- Re: Closing a privilege escalation, Richard Stallman, 2018/04/27
- Re: Closing a privilege escalation, Marcin Borkowski, 2018/04/27
- Re: Closing a privilege escalation, Clément Pit-Claudel, 2018/04/27
Re: Closing a privilege escalation, Davis Herring, 2018/04/25
Re: Closing a privilege escalation,
Glenn Morris <=