[rsbac] Urgent Security Bugfix 1.2.3-14

Andrea Pasquinucci cesare at ucci.it
Wed Feb 23 20:08:54 CET 2005


PS. I am using the kernels in 
  ftp://rsbac.mprivacy-update.de/rsbac/rsbacfixed/ 
and I am quite happy about them. Is the kernel 
   linux-2.6.10-rsbac-v1.2.3-pax-20050223.tar.bz2
free of this bug? (this is the same question as before, sorry, but the 
changelog say that it has applied only up to bugfix v1.2.3-13)

Andrea


On Wed, Feb 23, 2005 at 04:23:09PM +0100, Amon Ott wrote:
* RSBAC Security Bugfix v1.2.3-14 for 2.4 kernels has been released! 
* Urgency is high - please apply ASAP, if you run v1.2.3 on a 2.4 
* kernel!
* 
* 14. General/Kernels 2.4.x: Missing RSBAC interception for sys_sysctl
* 
*     * Urgency: High.
*     * What you see: Processes with sufficient Linux rights can change 
* sysctl settings through sys_sysctl, although not allowed by RSBAC 
* control.
*     * What is wrong: The syscall sys_sysctl is not intercepted, but 
* the proc interface at /proc/sys/ is intercepted correctly.
*     * Implications: Encapsulated daemons running as root or with 
* additional Linux capabilities can change important system settings. 
* E.g. kernel.modprobe controls, which binary is run by the kernel with 
* root rights when trying to access a not existing device.
*     * Credits: Thanks to Brad Sprengler for hinting at sys_sysctl.
*     * RSBAC versions affected: All versions up to 1.2.4.
*     * What you should do: Apply this patch (MD5 / GnuPG Cert) to get 
* the bug corrected, recompile the kernel, reinstall and reboot.
* 
* Amon.
* -- 
* http://www.rsbac.org - GnuPG: 2048g/5DEAAA30 2002-10-22



More information about the rsbac mailing list