From: Milan Broz <gmazyland@gmail.com>
To: oss-security@lists.openwall.com,
Demi Marie Obenour <demiobenour@gmail.com>,
Eric Biggers <ebiggers@kernel.org>
Cc: Jan Schaumann <jschauma@netmeister.org>, iwd@lists.linux.dev
Subject: Re: [oss-security] CVE-2026-31431: CopyFail: linux local privilege scalation
Date: Mon, 4 May 2026 07:57:38 +0200 [thread overview]
Message-ID: <021503ca-8a9b-4f9d-8b8e-81661572a018@gmail.com> (raw)
In-Reply-To: <19837ef5-e5b6-45f4-8336-3ce07423dfb1@gmail.com>
Hi,
On 5/1/26 9:24 PM, Demi Marie Obenour wrote:
> Cryptsetup needs CAP_SYS_ADMIN, but iwd definitely does not, and
> presumably BlueZ should not use have it either.
In cryptsetup, AF_ALG is used exactly in places where it does
NOT need CAP_SYS_ADMIN.
While I agree that AF_ALG is misdesigned (specifically, indirect
loading of kernel modules just on non-privileged user request),
it is used in real scenarios.
I can write a long story why it is used in cryptsetup, but long
story short:
- It is used for benchmarking, where we actually need kernel crypto.
As it will be used in real dm-crypt mapping later, benchmarking
userspace lib just does not make sense.
(Requiring CAP_SYS_ADMIN here is not such a big issue, and it is
a very rough test - but useful for relative comparison, not for the
real numbers.)
- It is used in TrueCrypt/VeraCrypt compatibility (at least).
This format needs to decrypt the header (first sector) with
the same algorithms as it is later mapped through dm-crypt.
Not everything is available in userspace (we support all historic
versions) and using AF_ALG was very convenient here.
By removing AF_ALG, you will completely break this format support.
including some distros (I think Tails uses that :).
We are using userspace libraries, but removing AF_ALG would be a pain.
It can be done, but it requires time.
> Cryptsetup is a special case because there are times when it may not
> be safe to allocate memory: if I/O to the swap partition is suspended,
> and the kernel tries to page data out to it, the system may deadlock.
> So calling into arbitrary third-party libraries might not be the best
> idea. Thankfully, Nettle should meet all of cryptsetup's requirements.
The cause with the swap is not such a big deal in reality.
Nettle is NO WAY for cryptsetup (we have support for it as an alternative
backend, but it cannot be the default). You do not see the whole picture.
Thanks,
Milan
next prev parent reply other threads:[~2026-05-04 5:57 UTC|newest]
Thread overview: 16+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <afJorKIje4O6dXbH@netmeister.org>
[not found] ` <d6111caa-db61-498a-92cb-ea7a0aa0a5e2@ehuk.net>
[not found] ` <87se8dgicq.fsf@gentoo.org>
[not found] ` <afL-QhLfEKqHZqka@eldamar.lan>
[not found] ` <20260430071917.GB54208@sol>
[not found] ` <177abb5d-8ba9-4bb9-8b23-9fbc868ed3cd@gmail.com>
[not found] ` <20260501180028.GA2260@sol>
2026-05-01 19:24 ` [oss-security] CVE-2026-31431: CopyFail: linux local privilege scalation Demi Marie Obenour
2026-05-01 20:18 ` Eric Biggers
2026-05-02 0:21 ` Demi Marie Obenour
2026-05-02 3:35 ` Eric Biggers
2026-05-02 3:54 ` Eric Biggers
2026-05-02 6:39 ` Demi Marie Obenour
2026-05-02 4:52 ` AF_ALG hardening Demi Marie Obenour
2026-05-02 8:19 ` Simon Richter
2026-05-02 20:42 ` Demi Marie Obenour
2026-05-02 19:16 ` Eric Biggers
2026-05-04 19:01 ` Simon Richter
2026-05-04 19:54 ` Eric Biggers
2026-05-04 5:57 ` Milan Broz [this message]
2026-05-04 6:13 ` [oss-security] CVE-2026-31431: CopyFail: linux local privilege scalation Demi Marie Obenour
2026-05-04 6:43 ` Eric Biggers
2026-05-04 7:14 ` Milan Broz
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=021503ca-8a9b-4f9d-8b8e-81661572a018@gmail.com \
--to=gmazyland@gmail.com \
--cc=demiobenour@gmail.com \
--cc=ebiggers@kernel.org \
--cc=iwd@lists.linux.dev \
--cc=jschauma@netmeister.org \
--cc=oss-security@lists.openwall.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox