/srv/irclogs.ubuntu.com/2023/05/10/#ubuntu-security.txt

SvenKieskemdeslaur: so 2 weeks without a patch for an exploitable bug? :/ 09:57
amurraySvenKieske: what security bug isn't exploitable? I agree 2 weeks is not ideal but the kernel team handles over 80 different kernel variants by my rough count - it is not trivial to prepare, test and release that many kernels - so really it is a wonder that they are that fast IMO11:29
SvenKieskeamurray: well this specific bug will have a working exploit being posted publicly by next monday, so that's a little special I suppose. also it's a local priv escalation in the default install afaik, so these seem a higher severity than other bugs.11:33
JanCfrom what I understand the exploit is already public11:39
JanCor semi-public at least11:39
SvenKieskeit's on the closed distro list and will be published - according to list policy - next monday. I don't know of any leaks yet. the comments on HN which say it's public don't understand the distro list, it seems.11:44
amurraylocal priv esc bugs in the kernel seem to be found at least once a month - the kernel team has a regular cadence of kernel releases specifically to roll in these sorts of fixes - but unfortunately it is just not realistic to expect them to have to disrupt that cycle so often11:46
amurraymy understanding is they reserve the 'drop everything an spin an emergency kernel' for the kinds of issues that are remotely exploitable etc 11:47
JanChow many things depend on user namespaces nowadays?11:53
SvenKieskeyeah sure, I understand that; I just disagree with this old fashioned interpretation of "remotely exploitable", because in modern systems design running code as a local unpriv. user is often exposed to untrusted end users directly and thus remotely reachable. take most cloud businesses as an example, be it a webhoster or whatever.11:53
SvenKieskeJanC: a lot, like: all your webbrowsers for example11:54
SvenKieskeall "rootless" container stuff11:54
JanCwell, those webbrowsers are not going to exploit this, and are mostly used on "single user" systems whose users have no reason to exploit it11:57
JanCthe problem is more with some of the container systems where untrusted third parties are involved11:58
amurraySvenKieske: fwiw I don't disagree with you that this is a serious bug but there are practical issues to preparing and releasing kernel updates for Ubuntu - we need to ensure these are high quality and appropriately tested etc and that takes a certain amount of time and planning, hence the regular cadence12:05
amurrayalso this is also why we are looking at trying to restrict unprivileged user namespaces by default in future ubuntu releases to only those things that need it12:06
JanCin the mean time, it might be useful to indicate what users can/should disable the exploited feature, or otherwise prevent it from being exploited (and how)...12:07
SvenKieskeamurray: I totally understand that you need proper testing etc.!12:10
SvenKieskeamurray: very encouraging to hear that you look into restrict the namespacing, but afaik upstream denied that this should get merged? I'm only aware of the currently available global on/off switch and IIRC finer grained controls were denied upstream? but I might remember that wrong.12:11
amurraythe lunar kernel has some patches that aren't upstream (but may get there..) for apparmor to restrict the use of user namespaces via its policy - so you can flick a more finer-grained switch so that apparmor will block the user of user namespaces if a process is not confined by apparmor with a policy that allows the use of it12:13
amurrayunfortunately I don't think the userspace bits landed so you would need a custom apparmor parser to be able to actually use this (hence why we don't really advertise it anywhere) but it shows the direction we are hoping to go with this12:14
georgiagthe userspace bits for user namespace mediation landed on kinetic and lunar12:24
georgiagin the downstream kernel there are some finer-grained sysctl restriction options. there are more details here https://gitlab.com/apparmor/apparmor/-/wikis/unprivileged_userns_restriction12:27
SvenKieskevery nice information, thank you both!12:30
SvenKieskeI fuzzyly remember reading something about this at lwn.net12:30
amurraygeorgiag: oh awesome - apologies for the confusion - thanks for schooling me - hopefully I remember next time12:38
georgiagamurray: no apologies needed!! it's a lot of stuff to keep track of12:41
sbeattiegpodder21:43
sbeattiebah21:43
sbeattiewe should probably add the unprivileged userns mediation to the security features wiki page.21:44
JanCand maybe someone at Canonical can write a blog about it (and how it can help protect against issues like the CVE discussed earlier today)21:52

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!