public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* local root exploit confirmed in 2.6.10: Linux 2.6 Kernel Capability LSM Module Local Privilege Elevation
@ 2004-12-28 21:21 Lee Revell
  2004-12-28 21:53 ` Lee Revell
  2004-12-29 10:25 ` bert hubert
  0 siblings, 2 replies; 5+ messages in thread
From: Lee Revell @ 2004-12-28 21:21 UTC (permalink / raw)
  To: linux-kernel

Frank Barknecht pointed this out on linux-audio-dev, it's a horrible
bug, I confirmed it in 2.6.10, and have not seen it mentioned on the
list.

Executive summary:

run "vim" as normal user.  Do ":r /etc/shadow".  Permission denied.

do "modprobe capability" as root in another terminal

Do ":r /etc/shadow" again in the same vim.  You will be able to read and
write /etc/shadow as normal user.

http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2004-12/0390.html

Lee


^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2004-12-29 14:01 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2004-12-28 21:21 local root exploit confirmed in 2.6.10: Linux 2.6 Kernel Capability LSM Module Local Privilege Elevation Lee Revell
2004-12-28 21:53 ` Lee Revell
2004-12-29 10:25 ` bert hubert
2004-12-29 10:32   ` Lee Revell
2004-12-29 14:01     ` Serge E. Hallyn

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox