|
Message-ID: <514CC0D8.6070906@redhat.com> Date: Fri, 22 Mar 2013 14:36:40 -0600 From: Kurt Seifried <kseifried@...hat.com> To: oss-security@...ts.openwall.com CC: John Lightsey <jd@...nel.net> Subject: Re: CVE request: mod_ruid2 before 0.9.8 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 03/22/2013 09:08 AM, John Lightsey wrote: > Hello, > > mod_ruid2 is a suexec style module for apache 2.0, 2.2 and 2.4, > based on mod_ruid and mod_suid2 that allows the Apache webserver to > run under the UID and GID of the user account that controls a > virtualhost. It also includes functionality to chroot Apache into > the virtualhost document root prior to processing HTTP requests. > > After processing each request, mod_ruid2 returns to its initial > starting state. For uid/gid changes this is done using linux > capabilities. For chroot, this is done by following a file > descriptor that leads outside of the chroot. > > In versions of mod_ruid2 before 0.9.8, the filedescriptor used to > break out of the chroot is inherited by all Apache subprocesses. > This allows CGI scripts to also to break out of the chroot by > performing a fchdir() across the inherited file descriptor. > > > http://sourceforge.net/mailarchive/forum.php?thread_name=514C503E.4020109%40users.sourceforge.net&forum_name=mod-ruid-announce Can > you provide a link to the source code fix? thanks. - -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux) iQIcBAEBAgAGBQJRTMDXAAoJEBYNRVNeJnmTmEEQAKisCqdWoFnAl4L6mLyuUfQG Mapd1orVQXvwmdsAtJajaueYd2qtkzoqJCkSOgEg+iCSdZEeNyqOJTqmd1qYyy3y swztum6+fM1NnMuQ0d6jN0E92hWJ92XWQhhdbsAnKv1WRZFjHUZ/cgDBd8nSEVxw cNH2a3E2l/r1sIeH33Vad5A1St0aikUkLM1Elk07CxuBeFg5gl82WNoMkHOn9MKi GRUR89l9E7G2k3gE/0DRUE1KoIYND26w0vuZzMllR852ibl4WSMbzwRhbWUE6ac0 +ne8VHUT/VGXoUfbkwI9hqLKuGOdDWx5VN6LE4qg/gLLPWN7Z5xwNFy+kGzPNXKU 9F7MB5izwpWzKTrLVd7Gcj+HtKU4ll7rSemLaRSXZUJOcU489unMv/sbxqrQSXHC JGpsftiIaPly80HVVxsVg0ZLfG8JKNk4aD4WvW0paOA0c7/Y1xjSQblfe6Q8m0FU hBGPsBVxC2NBUK4YGwt+OE77tvUReaIOfYBRgLVjEuib9NG486cbeJ1McyaeU2dr qOVV05nnqI/dvp5oiZWaWaFt4DQ9CD7HgTW+/rcLNPgxjSYWzhPPIJEKYjHhH93Z pEE1SNFVKVKkCQr344Hj1eoOQgBdrlsUzCCLTJA1W8sRauhaYJonUWHLxC8YbhAx swo1YvenbT5QV7pT1/0X =gEsZ -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.