
oss-sec mailing list archives
Re: CVE-2017-12847: nagios-core privilege escalation via PID file manipulation
From: Daniel Kahn Gillmor <dkg () fifthhorseman net>
Date: Wed, 06 Sep 2017 17:15:00 -0400
On Fri 2017-08-18 13:12:03 -0400, Michael Orlitzky wrote:
I'm scared to reply because this is guaranteed to turn into a "you should just use systemd, grandpa" holy war.
I'm pleasantly surprised to see that that didn't happen :) And thanks for your thoughtful response. fwiw, i wasn't thinking specifically of systemd -- there are several process managers that do more sensible things, including those in the daemontools lineage (e.g. runit) and others. Even sysvinit's /sbin/init itself can monitor single-process daemons without any trouble or need for a pidfile.
If we had it all to do over again, I would probably agree with you. But there are still users with simple init systems, and many of those users are happy (or stuck) that way. If you want to convince upstreams to delete their PID file code and drop support for the associated init systems, you'll have to offer them something to make up for the users they'll lose. For some projects, "the code gets simpler and to hell with those users" will suffice. But for big projects where actual money is involved, you'll have a harder time.
Yup, these are the tradeoffs. But i think future reports of problems with pidfiles (e.g. your helpful cleanup of mimedefang -- thanks!) should always include the suggestion to disable pidfiles entirely and to encourage developers who must implement them to ensure that they're only an extra feature, for use with otherwise limited service managers, and perhaps to be compile-time disabled. Having a pidfile by default ought to be treated as an increase in the attack surface in general, since they're so easy to get wrong. Thanks for your work in tracking these down and cleaning them up, Michael. Regards, --dkg
Attachment:
signature.asc
Description:
Current thread:
- CVE-2017-12847: nagios-core privilege escalation via PID file manipulation Michael Orlitzky (Aug 16)
- Re: CVE-2017-12847: nagios-core privilege escalation via PID file manipulation Daniel Kahn Gillmor (Aug 16)
- Re: CVE-2017-12847: nagios-core privilege escalation via PID file manipulation Michael Orlitzky (Aug 18)
- Re: CVE-2017-12847: nagios-core privilege escalation via PID file manipulation Daniel Kahn Gillmor (Sep 06)
- Re: CVE-2017-12847: nagios-core privilege escalation via PID file manipulation Michael Orlitzky (Sep 07)
- Re: CVE-2017-12847: nagios-core privilege escalation via PID file manipulation Simon McVittie (Sep 07)
- Re: CVE-2017-12847: nagios-core privilege escalation via PID file manipulation Daniel Kahn Gillmor (Sep 07)
- Re: CVE-2017-12847: nagios-core privilege escalation via PID file manipulation Simon McVittie (Sep 07)
- Re: CVE-2017-12847: nagios-core privilege escalation via PID file manipulation Daniel Kahn Gillmor (Sep 07)
- Re: CVE-2017-12847: nagios-core privilege escalation via PID file manipulation Michael Orlitzky (Aug 18)
- Re: CVE-2017-12847: nagios-core privilege escalation via PID file manipulation Daniel Kahn Gillmor (Aug 16)
- Re: CVE-2017-12847: nagios-core privilege escalation via PID file manipulation Daniel Kahn Gillmor (Sep 07)
- Re: CVE-2017-12847: nagios-core privilege escalation via PID file manipulation Michael Orlitzky (Sep 11)
- Re: CVE-2017-12847: nagios-core privilege escalation via PID file manipulation Simon McVittie (Sep 11)
- Re: CVE-2017-12847: nagios-core privilege escalation via PID file manipulation kseifried () redhat com (Sep 11)