Vasiliy Kulikov
2010-Sep-19 08:13 UTC
[Secure-testing-team] Bug#597382: unsafe chroot() call
Package: mingetty Version: 1.07-1 Severity: critical Tags: security patch Hi, mingetty doesn''t change current directory after chroot() call. It allows an attacker to call chdir("../") many times and get root directory. Also chdir(), chroot() and nice() are not checked for error return values. It allows an attacker to avoid local policy restriction in some cases. -- System Information: Debian Release: squeeze/sid APT prefers lucid-updates APT policy: (500, ''lucid-updates''), (500, ''lucid-security''), (500, ''lucid-proposed''), (500, ''lucid-backports''), (500, ''lucid'') Architecture: amd64 (x86_64) Kernel: Linux 2.6.32-25-generic (SMP w/2 CPU cores) Locale: LANG=ru_RU.utf8, LC_CTYPE=ru_RU.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages mingetty depends on: ii libc6 2.11.1-0ubuntu7.3 Embedded GNU C Library: Shared lib mingetty recommends no packages. mingetty suggests no packages. -- no debconf information -------------- next part -------------- A non-text attachment was scrubbed... Name: diff Type: text/x-c Size: 816 bytes Desc: not available URL: <http://lists.alioth.debian.org/pipermail/secure-testing-team/attachments/20100919/ce7bf36b/attachment.bin>