Summary: | Kernel: ptrace_attach: fix the usage of ->cred_exec_mutex (CVE-2009-1527) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Robert Buchholz (RETIRED) <rbu> |
Component: | Kernel | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | kernel |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=cad81bc2529ab8c62b6fdc83a1c0c7f4a87209eb | ||
Whiteboard: | [linux >=2.6.29 <2.6.29.3] [gp >=2.6.29-1 <2.6.29-6] | ||
Package list: | Runtime testing required: | --- |
Description
Robert Buchholz (RETIRED)
![]() note this allows for local root compromise: http://milw0rm.org/exploits/8673 This does not affect <2.6.29 (the code is different). I tried the exploit against 2.6.28.10 and it did not prevail. Eugene Teo, of Red Hat, said: "This vulnerability was introduced in commit d84f4f99 ("CRED: Inaugurate COW credentials"), and was fixed in commit cad81bc2 ("ptrace: ptrace_attach: fix the usage of ->cred_exec_mutex"). It affects kernel 2.6.29." Source: http://marc.info/?l=oss-security&m=124141149127926&w=2 |