[Touch-packages] [Bug 2043711] Re: Open3.pm tries to run code in /tmp when updating ubuntu-drivers-common

2023-12-15 Thread Andrew J. Caines
Caught the error again, again while running in Software Updater, but I captured the output from the beginning. There were only four related packages being updated. Preconfiguring packages ... Can't exec "/tmp/cryptsetup-initramfs.config.UaZ02N": Permission denied at /usr/lib/x86_64-linux-gnu/perl

[Touch-packages] [Bug 2043711] Re: Open3.pm tries to run code in /tmp when updating ubuntu-drivers-common

2023-12-10 Thread Andrew J. Caines
I will attempt to capture more details when I next observe the error so that the correct package can be identified for this report. -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to perl in Ubuntu. https://bugs.launchpad.net/bug

Re: [Touch-packages] [Bug 2043711] Re: Open3.pm tries to run code in /tmp when updating ubuntu-drivers-common

2023-11-21 Thread Steve Langasek
On Sun, Nov 19, 2023 at 08:02:42PM -, Andrew J. Caines wrote: > the fact remains that processes running as root created a file directly in > /tmp not using a safe *mktemp* process There is no evidence in this bug of unsafe temp file creation in /tmp. -- You received this bug notification be

Re: [Touch-packages] [Bug 2043711] Re: Open3.pm tries to run code in /tmp when updating ubuntu-drivers-common

2023-11-21 Thread Steve Langasek
On Mon, Nov 20, 2023 at 08:50:05PM -, Andrew J. Caines wrote: > You are of course quite right that the risk associated with a file > created with a "random" six character case-insensitive alphanumeric > suffix and run a moment later is far smaller than more obviously risky > misuses of /tmp. N

[Touch-packages] [Bug 2043711] Re: Open3.pm tries to run code in /tmp when updating ubuntu-drivers-common

2023-11-20 Thread Andrew J. Caines
You are of course quite right that the risk associated with a file created with a "random" six character case-insensitive alphanumeric suffix and run a moment later is far smaller than more obviously risky misuses of /tmp. Nevertheless the issue is not about evaluating the risk of an adversary crea

[Touch-packages] [Bug 2043711] Re: Open3.pm tries to run code in /tmp when updating ubuntu-drivers-common

2023-11-19 Thread Alex Murray
I am struggling to see the vulnerability here still - the path used in this case is /tmp/ubuntu-drivers-common.config.55GJ8b appears to have a randomly generated suffix and so couldn't have been guessed beforehand nor preseeded with other contents by a local attacker - so the only way then that I c

[Touch-packages] [Bug 2043711] Re: Open3.pm tries to run code in /tmp when updating ubuntu-drivers-common

2023-11-19 Thread Andrew J. Caines
@vorlon, Thank you for your considered response. I concur that this is not a vulnerability in the Ubuntu perl package. While I do not disagree with any of the points you make, the fact remains that processes running as root created a file directly in /tmp not using a safe *mktemp* process and late

[Touch-packages] [Bug 2043711] Re: Open3.pm tries to run code in /tmp when updating ubuntu-drivers-common

2023-11-19 Thread Julian Andres Klode
This might in fact be debconf itself that tries to place it there, in a system without dpkg-preconfigure aka without apt-utils installed or where it couldn't be preconfigured -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to per

[Touch-packages] [Bug 2043711] Re: Open3.pm tries to run code in /tmp when updating ubuntu-drivers-common

2023-11-19 Thread Steve Langasek
This is not a security bug, or a bug at all in perl. Software that executes commands under /tmp is not intrinsically insecure. Various hardening guides recommend mounting /tmp noexec because it's harder for programmers to get security handling of files under /tmp *right*; but an attempt to execu