Bug 169615
Summary: | security hole in kernel/apache | ||
---|---|---|---|
Product: | [Retired] Fedora Legacy | Reporter: | V <vejas> |
Component: | kernel | Assignee: | Fedora Legacy Bugs <bugs> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | rhl7.3 | CC: | deisenst, jkeating, marc.deslauriers |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | i386 | ||
OS: | Linux | ||
URL: | http://isec.pl/vulnerabilities/isec-0021-uselib.txt | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2005-10-26 15:45:06 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
V
2005-09-30 09:51:08 UTC
Hello V, Sorry it has taken awhile to respond to your bug report. It may very well be that the processes you see running a program called "uselib24" under user apache are caused by an exploit to buggy PHP or Perl scripts on your website. For example, see the following URL, that shows how a server had programs called "uselib24" running as user apache, due to PHPBB2 exploits and/or buggy perl scripts: <http://www.artoo.net/forum/viewtopic.php?p=828&sid=7bd81e80d1be78d0e46a7cd7212707cf> In the example at artoo.net, the fact that those programs are running has less to do with the kernel, and more to do with the buggy scripts which are allowing external people to download and run programs as user apache. I suspect you have been bitten by buggy PHP or PERL scripts like artoo.net was. I'd look in your webserver logs for tell-tale examples like artoo.net. You apparently are running version 2.4.20-43.7.legacy of the Linux kernel. Neither this version, nor the prior version 2.4.20-42.7.legacy, should be susceptible to being rooted via any uselib() exploits which affect earlier versions of the Linux kernel. [1] You should be protected from "uselib24" processes actually getting root access, if indeed they are attempting to use a uselib() exploit. That's the best we can do with kernel updates. Marc, Jesse, I would recommend closing this ticket NOTABUG. V, if you feel that this is clearly a kernel bug, you are welcome to reopen it. ===== [1] Here's a URL to the advisory that fixes root privilege escalation from uselib() exploits, CAN-2004-1235: <http://www.redhat.com/archives/fedora-legacy-announce/2005-February/msg00016.html>. |