Bug 730783 - (CVE-2011-2910) CVE-2011-2910 ax25-tools: possible privilege escalation due to failure to check for s*id return values
CVE-2011-2910 ax25-tools: possible privilege escalation due to failure to che...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On: 730784
  Show dependency treegraph
Reported: 2011-08-15 14:51 EDT by Vincent Danen
Modified: 2011-08-18 09:11 EDT (History)
3 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Vincent Danen 2011-08-15 14:51:17 EDT
Dan Rosenberg reported [1] that ax25d does not check the return value of a setuid call responsible for dropping privileges.  If the setuid call failed, the daemon would continue to run with root privileges.

This has not yet been corrected upstream [2].

[1] http://www.openwall.com/lists/oss-security/2011/08/10/3
[2] http://www.linux-ax25.org/cvsweb/ax25-tools/ax25/ax25d.c
Comment 1 Vincent Danen 2011-08-15 14:52:21 EDT
Created ax25-tools tracking bugs for this issue

Affects: fedora-all [bug 730784]
Comment 2 Ralf Baechle 2011-08-18 09:11:05 EDT
A few hours ago Thomas Osterried has checked in a fix for CVE-2011-2910 into linux-ax25.org's CVS archive, see https://www.linux-ax25.org/wiki/CVS for CVS instructions and how to build.  No new release tarballs have been created yet (or in the past few eons ...) and due to various other fixes a CVS checkout is currently urgently recommended over the released tarballs.

Note You need to log in before you can comment on or make changes to this bug.