[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#609455: linux-2.6: block hardlinks to non-accessible sources



Hello Ben,

Ben Hutchings wrote:
You seem to be a bit confused about this vulnerability.  /bin/bash is of
course not suid-root, only owned by root.

You're right. To correct this: It is a big problem for suid-root binaries, but even a problem for non-suid-root-binaries like "/bin/bash" - if you can write to /bin/bash after fooling the admin to run chown on your home, you own the system as soon as root logs in or some shell script is started as root.

Thanks for the information about POSIX.

Many distributions apply many patches that are not upstream.  We
generally try to avoid doing that in the standard kernel images.
Do you see any way to deny the described attacks (flooding /tmp, hardlinking insecure suid binaries) without this patch?

However, we may add kernel images with the 'grsec' featureset for the
next release (wheezy).
That sounds good.

Thanks

Max




Reply to: