Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 22 Mar 2013 14:36:40 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: John Lightsey <jd@...nel.net>
Subject: Re: CVE request: mod_ruid2 before 0.9.8

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 03/22/2013 09:08 AM, John Lightsey wrote:
> Hello,
> 
> mod_ruid2 is a suexec style module for apache 2.0, 2.2 and 2.4,
> based on mod_ruid and mod_suid2 that allows the Apache webserver to
> run under the UID and GID of the user account that controls a
> virtualhost. It also includes functionality to chroot Apache into
> the virtualhost document root prior to processing HTTP requests.
> 
> After processing each request, mod_ruid2 returns to its initial
> starting state. For uid/gid changes this is done using linux
> capabilities. For chroot, this is done by following a file
> descriptor that leads outside of the chroot.
> 
> In versions of mod_ruid2 before 0.9.8, the filedescriptor used to
> break out of the chroot is inherited by all Apache subprocesses.
> This allows CGI scripts to also to break out of the chroot by
> performing a fchdir() across the inherited file descriptor.
> 
> 
> http://sourceforge.net/mailarchive/forum.php?thread_name=514C503E.4020109%40users.sourceforge.net&forum_name=mod-ruid-announce

Can
> 
you provide a link to the source code fix? thanks.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)

iQIcBAEBAgAGBQJRTMDXAAoJEBYNRVNeJnmTmEEQAKisCqdWoFnAl4L6mLyuUfQG
Mapd1orVQXvwmdsAtJajaueYd2qtkzoqJCkSOgEg+iCSdZEeNyqOJTqmd1qYyy3y
swztum6+fM1NnMuQ0d6jN0E92hWJ92XWQhhdbsAnKv1WRZFjHUZ/cgDBd8nSEVxw
cNH2a3E2l/r1sIeH33Vad5A1St0aikUkLM1Elk07CxuBeFg5gl82WNoMkHOn9MKi
GRUR89l9E7G2k3gE/0DRUE1KoIYND26w0vuZzMllR852ibl4WSMbzwRhbWUE6ac0
+ne8VHUT/VGXoUfbkwI9hqLKuGOdDWx5VN6LE4qg/gLLPWN7Z5xwNFy+kGzPNXKU
9F7MB5izwpWzKTrLVd7Gcj+HtKU4ll7rSemLaRSXZUJOcU489unMv/sbxqrQSXHC
JGpsftiIaPly80HVVxsVg0ZLfG8JKNk4aD4WvW0paOA0c7/Y1xjSQblfe6Q8m0FU
hBGPsBVxC2NBUK4YGwt+OE77tvUReaIOfYBRgLVjEuib9NG486cbeJ1McyaeU2dr
qOVV05nnqI/dvp5oiZWaWaFt4DQ9CD7HgTW+/rcLNPgxjSYWzhPPIJEKYjHhH93Z
pEE1SNFVKVKkCQr344Hj1eoOQgBdrlsUzCCLTJA1W8sRauhaYJonUWHLxC8YbhAx
swo1YvenbT5QV7pT1/0X
=gEsZ
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.