Re: COSEINC Linux Advisory #1: Linux Kernel Parent Process Death

看板Bugtraq作者時間18年前 (2007/08/16 05:57), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串10/24 (看更多)
> > In this case check_kill_permission() returns -EPERM for unprivileged > > parent. > > > You always talked about setuid root process sending PDEATH_SIG to the > root child, didn't you? check_kill_permission() checks current->euid and > current->uid against t->uid and t->suid, where 'current' is the pointer > to the task_struct of the sender, or, in our case, of the dying setuid > root process, and 't' is the pointer to the task_struct of the root > child. If one of those checks succeeds then the entire > check_kill_permission() succeeds. current->euid is in our case 0, t->uid > and t->suid are 0 too. So where is the problem? The problem is that without suid binary execved from parent process you can not send the signal. ;) With suid binary you can and that makes this issue a privilege escalation vulnerability.
文章代碼(AID): #16mtQw00 (Bugtraq)
討論串 (同標題文章)
完整討論串 (本文為第 10 之 24 篇):
文章代碼(AID): #16mtQw00 (Bugtraq)