Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 08 Jul 2008 19:30:02 +0800
From: Eugene Teo <eteo@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE-2008-2931 kernel: missing check before setting
 mount propagation

Eugene Teo wrote:
> The do_change_type routine in the Linux kernel has a missing check for
> capable(CAP_SYS_ADMIN). Even though the mount command restricts the
> changing of mountpoint type to only root users, it is possible for local
> unprivileged users to bypass and abuse this problem. More details can be
> found at: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-2931
> 
> This affects kernel versions from 2.6.15-rc1 up to 2.6.22-rc1. The

Correction: It should be up to 2.6.21.

Thanks,
Eugene
-- 
Eugene Teo / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.