* Kernel fchown() exploit status?
@ 2004-07-08 21:06 Chris White
2004-07-08 21:54 ` Manuel Arostegui Ramirez
2004-07-08 23:24 ` Chris Wright
0 siblings, 2 replies; 6+ messages in thread
From: Chris White @ 2004-07-08 21:06 UTC (permalink / raw)
To: linux-kernel
There was a recent security announcment regarding a vulnerability with
the fchown function.
Only a few distrobutions (red hat/suse) have fixed the issue, but I've
yet to see a general patch for it.
Information regarding the issue is here:
http://xforce.iss.net/xforce/xfdb/16599
I searched around the archive databases, but did not come up with it
(unless I skipped over something accidentaly)
Thank you for your time and appologies if this is a duplicate.
-----------------
Chris White
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: Kernel fchown() exploit status?
2004-07-08 21:06 Kernel fchown() exploit status? Chris White
@ 2004-07-08 21:54 ` Manuel Arostegui Ramirez
2004-07-08 23:24 ` Chris Wright
1 sibling, 0 replies; 6+ messages in thread
From: Manuel Arostegui Ramirez @ 2004-07-08 21:54 UTC (permalink / raw)
To: Chris White, linux-kernel
El Jueves 08 Julio 2004 23:06, Chris White escribió:
> There was a recent security announcment regarding a vulnerability with
> the fchown function.
>
> Only a few distrobutions (red hat/suse) have fixed the issue, but I've
> yet to see a general patch for it.
>
> Information regarding the issue is here:
>
> http://xforce.iss.net/xforce/xfdb/16599
>
> I searched around the archive databases, but did not come up with it
> (unless I skipped over something accidentaly)
>
> Thank you for your time and appologies if this is a duplicate.
>
> -----------------
> Chris White
Thanks for the patch, I haven't read about it before.
--
Manuel Arostegui Ramirez #Linux Registered User 200896
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: Kernel fchown() exploit status?
2004-07-08 21:06 Kernel fchown() exploit status? Chris White
2004-07-08 21:54 ` Manuel Arostegui Ramirez
@ 2004-07-08 23:24 ` Chris Wright
2004-07-09 9:46 ` Michael Buesch
1 sibling, 1 reply; 6+ messages in thread
From: Chris Wright @ 2004-07-08 23:24 UTC (permalink / raw)
To: Chris White; +Cc: linux-kernel
* Chris White (webmaster@securesystem.info) wrote:
> There was a recent security announcment regarding a vulnerability with
> the fchown function.
>
> Only a few distrobutions (red hat/suse) have fixed the issue, but I've
> yet to see a general patch for it.
Patches are in both 2.4 and 2.6 bk trees. 2.4.27-rc3 has this fixed.
There hasn't been a 2.6.8-rc release since the patches went in to 2.6
For 2.4 see these patches:
http://linux.bkbits.net:8080/linux-2.4/cset@40e725f8sMbNK6BEQmRi5fWfux8l8A
http://linux.bkbits.net:8080/linux-2.4/cset@40e733598ODR85iS5HRft0zJTnDCHA
For 2.6 see these patches:
http://linux.bkbits.net:8080/linux-2.6/cset@40e62e18vom8K1fHgbJfe1oQ6mdkkQ
http://linux.bkbits.net:8080/linux-2.6/cset@40e6158bme9avS6IqahBN0wa9zx7LQ
thanks,
-chris
--
Linux Security Modules http://lsm.immunix.org http://lsm.bkbits.net
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: Kernel fchown() exploit status?
2004-07-08 23:24 ` Chris Wright
@ 2004-07-09 9:46 ` Michael Buesch
2004-07-09 10:02 ` Manuel Arostegui Ramirez
2004-07-09 18:17 ` Chris Wright
0 siblings, 2 replies; 6+ messages in thread
From: Michael Buesch @ 2004-07-09 9:46 UTC (permalink / raw)
To: Chris Wright; +Cc: Chris White, linux-kernel
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Quoting Chris Wright <chrisw@osdl.org>:
> * Chris White (webmaster@securesystem.info) wrote:
> > There was a recent security announcment regarding a vulnerability with
> > the fchown function.
> >
> > Only a few distrobutions (red hat/suse) have fixed the issue, but I've
> > yet to see a general patch for it.
>
> Patches are in both 2.4 and 2.6 bk trees. 2.4.27-rc3 has this fixed.
> There hasn't been a 2.6.8-rc release since the patches went in to 2.6
Is there an exploit available to test if the kernel has
this vulnerability?
- --
Regards Michael Buesch [ http://www.tuxsoft.de.vu ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
iD8DBQFA7ml2FGK1OIvVOP4RAtU7AKCX9p7P389fBEfb1uY0q0VEgKYYfACgjY3x
X4nZPpoLbFJVpRwQOtKCbOk=
=E2bp
-----END PGP SIGNATURE-----
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: Kernel fchown() exploit status?
2004-07-09 9:46 ` Michael Buesch
@ 2004-07-09 10:02 ` Manuel Arostegui Ramirez
2004-07-09 18:17 ` Chris Wright
1 sibling, 0 replies; 6+ messages in thread
From: Manuel Arostegui Ramirez @ 2004-07-09 10:02 UTC (permalink / raw)
To: Michael Buesch, Chris Wright, linux-kernel; +Cc: Chris White
El Viernes 09 Julio 2004 11:46, Michael Buesch escribió:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Quoting Chris Wright <chrisw@osdl.org>:
> > * Chris White (webmaster@securesystem.info) wrote:
> > > There was a recent security announcment regarding a vulnerability with
> > > the fchown function.
> > >
> > > Only a few distrobutions (red hat/suse) have fixed the issue, but I've
> > > yet to see a general patch for it.
> >
> > Patches are in both 2.4 and 2.6 bk trees. 2.4.27-rc3 has this fixed.
> > There hasn't been a 2.6.8-rc release since the patches went in to 2.6
>
> Is there an exploit available to test if the kernel has
> this vulnerability?
Look at this:
http://www.securityfocus.com/bid/10662/exploit/
It says that it's not exploit requiered to exploit this bug.
Any ideas, Chris White?
Cheers
--
Manuel Arostegui Ramirez #Linux Registered User 200896
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: Kernel fchown() exploit status?
2004-07-09 9:46 ` Michael Buesch
2004-07-09 10:02 ` Manuel Arostegui Ramirez
@ 2004-07-09 18:17 ` Chris Wright
1 sibling, 0 replies; 6+ messages in thread
From: Chris Wright @ 2004-07-09 18:17 UTC (permalink / raw)
To: Michael Buesch; +Cc: Chris Wright, Chris White, manuel, linux-kernel
* Michael Buesch (mbuesch@freenet.de) wrote:
> Is there an exploit available to test if the kernel has
> this vulnerability?
Just use of chown(2).
thanks,
-chris
--
Linux Security Modules http://lsm.immunix.org http://lsm.bkbits.net
^ permalink raw reply [flat|nested] 6+ messages in thread
end of thread, other threads:[~2004-07-09 18:17 UTC | newest]
Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2004-07-08 21:06 Kernel fchown() exploit status? Chris White
2004-07-08 21:54 ` Manuel Arostegui Ramirez
2004-07-08 23:24 ` Chris Wright
2004-07-09 9:46 ` Michael Buesch
2004-07-09 10:02 ` Manuel Arostegui Ramirez
2004-07-09 18:17 ` Chris Wright
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox