Yes, yes, there was a CVE in 2022 which addressed a security issue with the Kernel call interface “io_uring” and, multiple Ring Buffers for asynchronous I/O ain’t new – I first came into contact with the things back in the mid 1980s with the DEC Standard Disk Interconnect serial interface …
But, there seems to be an ongoing question mark with regard to current security implications around the current Linux Kernel implementation.
If I disable the thing then, because “io_uring_group” is set by openSUSE default to ‘-1’ only processes with the CAP_SYS_ADMIN capability may create io_uring instances.
Currently, here on Leap 15.6, there’s only the following capabilities set by default –
Yes, agreed, if you’re running a Samba server – in other words, almost each and almost every NAS box – you have a problem …
Where I’m becoming somewhat impatient is, the time being taken to add the CAP_SYS_ADMIN capability to those applications which could use the Kernel’s multiple Ring Buffers – including and especially network I/O …
The solution is there in the Kernel – it’s available – use it!!!
Instead of keeping io_uring just for Samba/QEMU enabled why not set io_uring_disabled to 1 and give Samba/QEMU rights using the io_uring_group or a similar method?
Given that, we haven’t really found anything other than –
libdex
GEOPM
Music Player Daemon
QEMU
samba
which requires io_uring, personally, I’ll set the value of “io_uring_disabled” to ‘1’ for a while – with the hope that FUSE still doesn’t use the thing …