Bug 112484
Summary: | Kernel vulnerable for duplicate PIDs | ||
---|---|---|---|
Product: | [Retired] Red Hat Linux | Reporter: | Robert Scheck <redhat-bugzilla> |
Component: | kernel | Assignee: | Arjan van de Ven <arjanv> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 9 | CC: | mitr, riel, tao |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2004-04-15 17:14:13 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Robert Scheck
2003-12-20 20:01:35 UTC
So this shouldn't affect any NPTL kernel which has entirely different code. One of our kernel engineers said "A duplicate PID can be a security issue if the duplicate replaces the previous task. In that case an unprivileged user could "mask" the PID of a root daemon, and if somewhere authentication is PID based, it could assume the identity of that process." however since users cannot normally fill up the PID space there would not be a generic exploit for the default install. Hm, but why is Fedora Core's NPTL Kernel then patched against the vulnerability, when it isn't affected? The Fedora NPTL patch actually _removes_ that code. Again, it's completely different. Okay...if you say that, then it isn't a bug :-) |