Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Creating a separate post so more people see this: the mitigation recommended by Theori.io for copy.fail *WILL NOT WORK* for any RHEL or RHEL-derived distro, including CentOS, Fedora, Oracle, and Alma as the vulnerable code is built-in.

Creating a separate post so more people see this: the mitigation recommended by Theori.io for copy.fail *WILL NOT WORK* for any RHEL or RHEL-derived distro, including CentOS, Fedora, Oracle, and Alma as the vulnerable code is built-in.

Scheduled Pinned Locked Moved Uncategorized
5 Posts 2 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • grsecurity@infosec.exchangeG This user is from outside of this forum
    grsecurity@infosec.exchangeG This user is from outside of this forum
    grsecurity@infosec.exchange
    wrote last edited by
    #1

    Creating a separate post so more people see this: the mitigation recommended by Theori.io for copy.fail *WILL NOT WORK* for any RHEL or RHEL-derived distro, including CentOS, Fedora, Oracle, and Alma as the vulnerable code is built-in.

    grsecurity@infosec.exchangeG I 2 Replies Last reply
    0
    • grsecurity@infosec.exchangeG grsecurity@infosec.exchange

      Creating a separate post so more people see this: the mitigation recommended by Theori.io for copy.fail *WILL NOT WORK* for any RHEL or RHEL-derived distro, including CentOS, Fedora, Oracle, and Alma as the vulnerable code is built-in.

      grsecurity@infosec.exchangeG This user is from outside of this forum
      grsecurity@infosec.exchangeG This user is from outside of this forum
      grsecurity@infosec.exchange
      wrote last edited by
      #2

      For it to be effective at all, you would need to have CONFIG_CRYPTO_USER_API_AEAD=m. If it's =y, there is no module and the mitigation is a no-op. https://oracle.github.io/kconfigs/?config=CRYPTO_USER_API_AEAD&
      shows the setting for common distros/versions, but it's most reliable to check your running kernel's config.

      grsecurity@infosec.exchangeG 1 Reply Last reply
      0
      • grsecurity@infosec.exchangeG grsecurity@infosec.exchange

        For it to be effective at all, you would need to have CONFIG_CRYPTO_USER_API_AEAD=m. If it's =y, there is no module and the mitigation is a no-op. https://oracle.github.io/kconfigs/?config=CRYPTO_USER_API_AEAD&
        shows the setting for common distros/versions, but it's most reliable to check your running kernel's config.

        grsecurity@infosec.exchangeG This user is from outside of this forum
        grsecurity@infosec.exchangeG This user is from outside of this forum
        grsecurity@infosec.exchange
        wrote last edited by
        #3

        For RHEL/RHEL-derived configurations, this approach will work (the function name has been stable since 2015 and initcall_blacklist has been supported since 2014): https://news.ycombinator.com/item?id=47956504

        1 Reply Last reply
        0
        • grsecurity@infosec.exchangeG grsecurity@infosec.exchange

          Creating a separate post so more people see this: the mitigation recommended by Theori.io for copy.fail *WILL NOT WORK* for any RHEL or RHEL-derived distro, including CentOS, Fedora, Oracle, and Alma as the vulnerable code is built-in.

          I This user is from outside of this forum
          I This user is from outside of this forum
          idkrn@infosec.exchange
          wrote last edited by
          #4

          @grsecurity you said grsec can be vulnerable “only MODHARDEN has a chance.” What about rbac?

          grsecurity@infosec.exchangeG 1 Reply Last reply
          0
          • I idkrn@infosec.exchange

            @grsecurity you said grsec can be vulnerable “only MODHARDEN has a chance.” What about rbac?

            grsecurity@infosec.exchangeG This user is from outside of this forum
            grsecurity@infosec.exchangeG This user is from outside of this forum
            grsecurity@infosec.exchange
            wrote last edited by
            #5

            @idkrn Sure, RBAC too, subjects with connect/bind rules automatically apply restrictions on socket families (limited to AF_UNIX/AF_INET). Any use of other socket families above that requires explicit sock_allow_family rules, so would block the AF_ALG use.

            1 Reply Last reply
            1
            0
            • R relay@relay.infosec.exchange shared this topic
            Reply
            • Reply as topic
            Log in to reply
            • Oldest to Newest
            • Newest to Oldest
            • Most Votes


            • Login

            • Login or register to search.
            • First post
              Last post
            0
            • Categories
            • Recent
            • Tags
            • Popular
            • World
            • Users
            • Groups