[Gllug] Root exploit 2.2.0 to 2.4.10
Chris Ball
chris at void.printf.net
Thu Oct 20 00:23:13 UTC 2011
On Fri, 2001-10-19 at 20:12, William Palfreman wrote:
> Just seen this on /. I'm about to just testing it now to see if it is
> true. If it is and you administer shell account boxes you could be
> in trouble. Expect a very rapid release of 2.2.20!
You didn't provide a link and it's not on the front page, so I'll
explain a little.
There's a kernel bug that can allow:
o A DOS attack through referencing an arbitrary number of symlinks
o A /local/ root exploit via an setuid app (in this example, a
world-executable and setuid root /usr/bin/addgrp) and ptrace.
It affects all 2.2 kernels, and 2.4 kernels pre 2.4.10. I'm upgrading a
few public-facing machines now.. *sigh*
Details at:
http://www.securityfocus.com/cgi-bin/archive.pl?id=1&mid=221337&start=2001-10-15&end=2001-10-21
~C.
--
$a="printf.net"; Chris Ball | chris at void.$a | www.$a | finger: chris@$a
"In the beginning there was nothing, which exploded."
--
Gllug mailing list - Gllug at linux.co.uk
http://list.ftech.net/mailman/listinfo/gllug
More information about the GLLUG
mailing list