DoS and Root Compromise Kernel Bug?

From: Jeremy Andrews (jeremy@kerneltrap.com)
Date: Fri Oct 19 2001 - 13:08:53 EST


Hello,

  Yesterday Rafal Wojtczuk posted to BugTraq regarding two kernel bugs:
   
http://www.securityfocus.com/cgi-bin/archive.pl?id=1&mid=221337&start=2001-10-15&end=2001-10-21

  I'm curious to understand more about these bugs. I.E., are they real? And,
are they fixed in 2.4.12 as claimed? How about in the -ac series?

  The first kernel bug is regarding symbolic links. Rafal says it is partially
fixed in 2.4.10, and completely fixed in 2.4.12. This bug allows for a local
user to carry out a Denial of Service attack.

  The second bug allows for a root compromise via ptrace. The requirements are
that /usr/bin/newgrp be suid root (as in my RedHat 7.0 server), and that newgrp
not prompt for a password when run without arguments (again, as is the case with
my RedHat 7.0 server). Rafal says the attack only appears to work on Linux.

Thanks,
 -Jeremy

--
 Jeremy Andrews    <mailto:jeremy@kerneltrap.com>
 PGP Key ID: 8F8B617A  http://www.kerneltrap.com/
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



This archive was generated by hypermail 2b29 : Tue Oct 23 2001 - 21:00:24 EST