phil

@bieberium@infosec.exchange
46 Followers
209 Following
8.4K Posts

IETF RFC1925:

With sufficient thrust, pigs fly just fine. However, this is not necessarily a good idea. [...]

PronounsHe / Him
LocationCentral Germany
ProfessionSecurity minded AD & Entra ID admin
Bookwyrmhttps://books.infosec.exchange/user/bieberium
Twitter (archival data)https://twitter.com/bieberium
Twittodon (archival data)https://twittodon.com/share.php?t=bieberium&m=bieberium%40infosec.exchange
W021 – Flammable material

Image source: https://commons.wikimedia.org/wiki/File:ISO_7010_W021.svg
Author: Wikimedia Commons user MaxxL
Public domain

After closing the weekend's four new #curl security reports as not applicable, we have now received **thirty-three** submissions since the last confirmed genuine one. Thirty-three ones that were not security problems. (A few of them were proper bugs though.)

I don't think we are ready to make the call just yet, but I suspect our bug bounty's days are numbered.

Counter-intuitive but apparently correct. London sports an oceanic climate with regular drizzle which makes it feel more QUALITATIVELY 'rainy'. But other regions suffer more intense bouts of thunderstorms & rainfall esp. which creates more QUANTITY of actual rain water.

(by Instagram user @loverofgeography AKA Jordi Savell)

Finally a useful magic quadrant

Thanks to @wendynather for the discovery.

#cybersecurity #vulnerability

#KungFu knight. Le livre de Lancelot du Lac and other Arthurian Romances, Northern France 13th century. Beinecke Rare Book & Manuscript Library, MS 229, fol. 326r.
#medieval #MedievalArt
Now that we all understand tariffs a little better, the plot of Phantom Menace makes more sense.

I wanna record an audiobook that's 8 hours of breathing and page turning.

Then just "Oh, you mean out loud?" right at the end.

Welches Rüsseltier ist sehr sehr müde?
.
.
.
.
.
.
.
Pennjamin Blümchen
It's funny because it's true
What option should I pick
×

https://github.com/ubuntu/authd/security/advisories/GHSA-g8qw-mgjx-rwjr

When a user who hasn't logged in to the system before (i.e. doesn't exist in the authd user database) logs in via SSH, the user is considered a member of the root group in the context of the SSH session. That leads to a local privilege escalation if the user should not have root privileges.

@cR0w There’s TOFU and there’s TOFU
@cR0w but Mark Shuttleworth only hires the finest high school valedictorians after a 12 month hazing process posing as an interview!

@rootwyrm @cR0w from the team that created the new image of WVWA, Pound Ridge, New York.

https://www.youtube.com/watch?v=hsHYp4k7fFw

NINE! - WVWA Pound Ridge, New York

YouTube
@cR0w No way this is "moderate" lmao, how is an LPE C:L/I:L/A:N?
@cR0w I love how they're downplaying this. It's obviously C:H/I:H/A:H, but of course they're not admitting to that.
@cR0w
PAM - 1001 ways to shoot yourselves into the foot.
@cR0w Lol, ubuntu-authd was defaulting to gid 0.
@cR0w And seems like https://github.com/ubuntu/authd/commit/619ce8e55953b970f1765ddaad565081538151ab does not fixes value it gets initialized to (ought to be something like nogroup) but only addresses the logic error.

So "0 days since last ubuntu-authd tripped and gave too much privileges"
Fix new users logging in via SSH being part of the root group · ubuntu/authd@619ce8e

The temporary user record we returned in the pre-auth NSS request did not have a GID set, so it defaulted to GID 0 (the ID of the root group). Turns out the user is actually considered part of that...

GitHub

@lanodan @cR0w it does.

There's no other way the user group can be initialized, unless you know the code better.

@3v1n0 @cR0w There's a difference between initializing a struct to safe values when it's declared, and ending up going through /current/ branches to see if it can fail.
@lanodan @cR0w well, we may have wrapped it into function helpers doing the same, but it's not really changing much imho.
This is the one thing we DIDN'T want to happen.

YouTube
@cR0w I love a disposable root shell
@cR0w I like the workaround, "do not use this software". A beautiful universally applicable workaround for any vulnerability.
@f4grx @cR0w yoooo....!
@kkarhan @cR0w I have no idea who is the character on this gif, but I found her fun, saved it, and today is the perfect occasion to repost her 😁
Half-Life 2 but it's Kizuna AI

YouTube

@kkarhan @cR0w oh noooo lol

Edit: ok despite the name this has nothing to do with modern LLMs, it's more a VR avatar like Hatsune Miku.

@f4grx @cR0w but remember! Everyone saying systemd and snaps and authd are all terrible fucking ideas by terrible fucking people who continually and repeatedly demonstrate forcefully they have no fucking clue is just a hater and wrong!

Also don't point out that sssd identified this as a possible issue... well, was before $jobF so at least 10 years or so?

@rootwyrm @f4grx @cR0w what does systemd have to do with canonical's utter bullshit again
@cR0w Canonical is truly a gift that keeps on giving
@cR0w The hivis and clipboard of invisibility aren't meant to get you C-suite permissions!
@cR0w if only there was a better systems programming language that this stuff could be written in that would avoid these sort of errors. Hypothetically it would be ideal for this sort of security sensitive project :(
@cR0w @yomimono Luckily, there's a simple fix for this. Just give all users root privileges, and then the behavior will be correct and the privilege escalation bug goes away.
@angusm @cR0w @yomimono ah, I see you're familiar with modern DevOops.

@angusm @cR0w @yomimono

I know you make a joke here but I worked at a Fortune 50 company that basically did this to reduce help desk call volume.

Spectacular.

@cR0w ::blinks repeatedly::

Wut

@cR0w at least it's not in something fundamentally core to the function of the network-connected OS...

Oh fuck off.

@cR0w why would anyone run ubuntu over Debian, like for real?
@cR0w sure hope everybody has properly configured service users without login shells!
@cR0w
David Attenborough voice:
"As a sign of cooperation, the wild server offers a reciprocal 'root on first use' to the user's 'trust on first use'..."

@cR0w this is even more hilarious than the cryptography bug my partner found last year https://github.com/ubuntu/authd/security/advisories/GHSA-4gfw-wf7c-w6g2

That one at least had subtlety

Attacker-controlled usernames yield controllable UIDs

CVE description: Authd, through version 0.3.6, did not sufficiently randomize user IDs to prevent collisions. A local attacker who can register user names could spoof another user's ID and gain ...

GitHub

@cR0w

It's called "wheel", damn it!

One has to love the push to using zero initialization so that programs always give you privileged group membership instead of membership of whatever random group ID number happened to be on the stack.

Security by uninitialized variable.

(-:

#FreeBSD #NetBSD #OpenBSD

@cR0w pity there wasn't some kind of daemon running that could tale care of root thingys for SSH.
Thread by @spendergrsec on Thread Reader App

@spendergrsec: Vibe coding has no place in Linux kernel maintenance. The vulnerability inserted into 5 LTS kernels at once apparently without any review is yet another instance of AUTOSEL fallout, here with the "new...…

@buherator @cR0w how else are we going to get companies to pay maintenance fees for free software?

@cR0w @GossiTheDog thanks for the heads up! Luckily I never felt the need to SSH via cloud login and don't have authd installed (only ed25519 keys for me.)

But crazy to see it downplayed so - Completely counter to the trust needed in the authentication space.

Fix new users logging in via SSH being part of the root group · ubuntu/authd@619ce8e

The temporary user record we returned in the pre-auth NSS request did not have a GID set, so it defaulted to GID 0 (the ID of the root group). Turns out the user is actually considered part of that...

GitHub
@cR0w Am I reading this right that any random Joe logging into a computer remotely via the internet would have instant right to do whatever they pleased with said computer, like deleting files willy nilly? If so, then God damn
@sapphicselene AFAICT you would already need an account on the target system, just not a privileged one.
@cR0w this might go back all the way to the start of systemd
@cR0w how tf this is considered "moderate" is beyond me.
@cR0w Canonical QA tester: ssh login works ✅