FS#21435 - [glibc 2.12.1-2] local privilege escalation
Attached to Project:
Arch Linux
Opened by Sébastien Luttringer (seblu) - Saturday, 23 October 2010, 17:05 GMT
Last edited by Allan McRae (Allan) - Monday, 25 October 2010, 07:26 GMT
Opened by Sébastien Luttringer (seblu) - Saturday, 23 October 2010, 17:05 GMT
Last edited by Allan McRae (Allan) - Monday, 25 October 2010, 07:26 GMT
|
Details
Description:
Current glibc upstream is vulnerable to easy local root exploit : CVE-2010-3847 CVE-2010-3856. i've tested the following exploit : http://www.exploit-db.com/exploits/15304/ on my up-to-date arch system and it was succeful (after some modifications). Politics of arch is to update only from upstream, but i'm wondering if security issue (like this one) you push some patch manually? |
This task depends upon
Closed by Allan McRae (Allan)
Monday, 25 October 2010, 07:26 GMT
Reason for closing: Fixed
Additional comments about closing: glibc-2.12.1-3
Monday, 25 October 2010, 07:26 GMT
Reason for closing: Fixed
Additional comments about closing: glibc-2.12.1-3
umask 0;LD_AUDIT="libpcprofile.so" PCPROFILE_OUTPUT="/etc/cron.d/exploit" ping; ls -l /etc/cron.d/exploit
and you'll realize there's something wrong..
I will look into the patch. Urlich seems to want to give it some thought before accepting into glibc which tells me that this change is not one to be taken lightly...