Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20091117204812.05b6c155@redhat.com>
Date: Tue, 17 Nov 2009 20:48:12 +0100
From: Tomas Hoger <thoger@...hat.com>
To: oss-security@...ts.openwall.com
Cc: jt@....org
Subject: Re: CVE request: oping allows the disclosure of 
 arbitrary file contents

On Mon, 16 Nov 2009 17:39:30 -0500 (EST) Josh Bressers wrote:

> > Does the RLIMIT_NPROC trick work against oping, or any setuid app
> > that calls setuid(getuid())?
> 
> This should work for everything that calls setuid()
> 
> I have a little bit about this here:
> http://www.bress.net/blog/archives/34-setuid-madness.html

My previous web search did find that one.  Though set_user() doing
NPROC check is only called when new uid differs from current real uid
(so not called in setuid(getuid()) case).

-- 
Tomas Hoger / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.