Bug 730783 (CVE-2011-2910) - CVE-2011-2910 ax25-tools: possible privilege escalation due to failure to check for s*id return values
Summary: CVE-2011-2910 ax25-tools: possible privilege escalation due to failure to che...
Status: NEW
Alias: CVE-2011-2910
Product: Security Response
Classification: Other
Component: vulnerability   
(Show other bugs)
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: public=20110809,reported=20110809,sou...
Keywords: Security
Depends On: 730784
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-08-15 18:51 UTC by Vincent Danen
Modified: 2011-08-18 13:11 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

Description Vincent Danen 2011-08-15 18:51:17 UTC
Dan Rosenberg reported [1] that ax25d does not check the return value of a setuid call responsible for dropping privileges.  If the setuid call failed, the daemon would continue to run with root privileges.

This has not yet been corrected upstream [2].

[1] http://www.openwall.com/lists/oss-security/2011/08/10/3
[2] http://www.linux-ax25.org/cvsweb/ax25-tools/ax25/ax25d.c

Comment 1 Vincent Danen 2011-08-15 18:52:21 UTC
Created ax25-tools tracking bugs for this issue

Affects: fedora-all [bug 730784]

Comment 2 Ralf Baechle 2011-08-18 13:11:05 UTC
A few hours ago Thomas Osterried has checked in a fix for CVE-2011-2910 into linux-ax25.org's CVS archive, see https://www.linux-ax25.org/wiki/CVS for CVS instructions and how to build.  No new release tarballs have been created yet (or in the past few eons ...) and due to various other fixes a CVS checkout is currently urgently recommended over the released tarballs.


Note You need to log in before you can comment on or make changes to this bug.