Red Hat Bugzilla – Bug 730783
CVE-2011-2910 ax25-tools: possible privilege escalation due to failure to check for s*id return values
Last modified: 2011-08-18 09:11:05 EDT
Dan Rosenberg reported  that ax25d does not check the return value of a setuid call responsible for dropping privileges. If the setuid call failed, the daemon would continue to run with root privileges.
This has not yet been corrected upstream .
Created ax25-tools tracking bugs for this issue
Affects: fedora-all [bug 730784]
A few hours ago Thomas Osterried has checked in a fix for CVE-2011-2910 into linux-ax25.org's CVS archive, see https://www.linux-ax25.org/wiki/CVS for CVS instructions and how to build. No new release tarballs have been created yet (or in the past few eons ...) and due to various other fixes a CVS checkout is currently urgently recommended over the released tarballs.