Linux ptrace race condition allows a local attacker to gain root privileges

linux-ptrace-race-condition (7311) The risk level is classified as HighHigh Risk

Description:

The ptrace program in some Linux distributions is vulnerable to a race condition that could allow a local attacker to gain root privileges. If ptrace is running in the background and a setuid root binary program (such as newgrp which executes a shell) is executed, a local attacker can execute arbitrary code on the system to gain root privileges.


Consequences:

Gain Privileges

Remedy:

For Caldera OpenLinux 2.3:
Upgrade to the latest Linux kernel package (2.2.10-13 or later), as listed in Caldera International, Inc. Security Advisory CSSA-2001-036.0. See References.

For Caldera OpenLinux eServer 2.3.1 and eBuilder:
Upgrade to the latest Linux kernel package (2.2.14-12S or later), as listed in Caldera International, Inc. Security Advisory CSSA-2001-036.0. See References.

For Caldera OpenLinux eDesktop 2.4:
Upgrade to the latest Linux kernel package (2.2.14-8 or later), as listed in Caldera International, Inc. Security Advisory CSSA-2001-036.0. See References.

For Caldera OpenLinux Server 3.1:
Upgrade to the latest Linux kernel package (2.4.2-13S or later), as listed in Caldera International, Inc. Security Advisory CSSA-2001-036.0. See References.

For Caldera OpenLinux Workstation 3.1:
Upgrade to the latest Linux kernel package (2.4.2-13D or later), as listed in Caldera International, Inc. Security Advisory CSSA-2001-036.0. See References.

For Trustix Secure Linux 1.01, 1.1, 1.2, and 1.5:
Upgrade to the latest Linux kernel package (2.2.19-6tr or later), as listed in Trustix Secure Linux Security Advisory #2001-0028. See References.

For EnGarde Secure Linux 1.0.1:
Upgrade to the latest Linux kernel package (2.2.19-1.0.20 or later), as listed in EnGarde Secure Linux Security Advisory ESA-20011019-02. See References.

For Immunix OS 7.0:
Upgrade to the latest Linux kernel package (2.2.19-8_imnx or later), as listed in Immunix OS Security Advisory IMNX-2001-70-035-01. See References.

For Red Hat Linux 7.1:

Upgrade to the Linux kernel package (2.4.9-6 or later), as listed in RHSA-2001:129-05. See References.

For Conectiva Linux 5.0, prg graficos, ecommerce, 5.1, 6.0, and 7.0:
Upgrade to the latest Linux kernel package (2.2.19 or later), as listed in Conectiva Linux Security Annoucement CLA-2001:432. See References.

For SuSE Linux 6.3, 6.4, 7.0, 7.1, 7.2, and 7.3:
Upgrade to the appropriate Linux kernel package, by following the instructions listed in SuSE Security Announcement SuSE-SA:2001:036. See References.

For systems running HP Secure OS software for Linux Release 1.0:
Apply the appropriate patch for your system, as listed in Hewlett-Packard Company Security Bulletin HPSBTL0112-003. See References.

For Mandrake Linux 7.1, 7.2, 8.0, 8.1, Corporate Server 1.0.1, and Single Network Firewall 7.2:
Upgrade to the latest Linux kernel package (2.2.19 or later), as listed in MandrakeSoft Security Advisory MDKSA-2001:082-1 : kernel. See References.

For other distributions:
Contact your vendor for upgrade or patch information.

References:

Platforms Affected:

  • Conectiva Linux 5.0
  • Conectiva Linux 5.1
  • Conectiva Linux 6.0
  • Conectiva Linux 7.0
  • Conectiva Linux ecommerce
  • Conectiva Linux prg_graficos
  • HP Secure OS 1.0
  • Immunix Immunix OS 6.2
  • Immunix Immunix OS 7.0
  • Linux Kernel 2.2.0
  • Linux Kernel 2.2.1
  • Linux Kernel 2.2.10
  • Linux Kernel 2.2.11
  • Linux Kernel 2.2.12
  • Linux Kernel 2.2.13
  • Linux Kernel 2.2.14
  • Linux Kernel 2.2.15
  • Linux Kernel 2.2.16
  • Linux Kernel 2.2.18
  • Linux Kernel 2.2.19
  • Linux Kernel 2.2.2
  • Linux Kernel 2.2.3
  • Linux Kernel 2.2.4
  • Linux Kernel 2.2.5
  • Linux Kernel 2.2.6
  • Linux Kernel 2.2.7
  • Linux Kernel 2.2.8
  • Linux Kernel 2.2.9
  • Linux Kernel 2.4.10
  • Linux Kernel 2.4.2
  • Linux Kernel 2.4.3
  • Linux Kernel 2.4.7
  • Linux Kernel 2.4.8
  • Linux Kernel 2.4.9
  • Linux Linux Kernel 2.2.17
  • MandrakeSoft Mandrake Linux 7.1
  • MandrakeSoft Mandrake Linux 7.2
  • MandrakeSoft Mandrake Linux 8.0
  • MandrakeSoft Mandrake Linux 8.1
  • MandrakeSoft Mandrake Linux Corporate Server 1.0.1
  • MandrakeSoft Mandrake Single Network Firewall 7.2
  • RedHat Linux 6.2
  • RedHat Linux 7
  • RedHat Linux 7.1
  • RedHat Linux 7.2
  • RedHat Linux 7.3
  • SCO Caldera OpenLinux 2.3
  • SCO Caldera OpenLinux eBuilder
  • SCO Caldera OpenLinux eDesktop 2.4
  • SCO Caldera OpenLinux eServer 2.3.1
  • SCO Caldera OpenLinux Server 3.1
  • SCO Caldera OpenLinux Workstation 3.1
  • SUSE SuSE Linux 6.3
  • SUSE SuSE Linux 6.4
  • SUSE SuSE Linux 7.0
  • SUSE SuSE Linux 7.1
  • SUSE SuSE Linux 7.2
  • SUSE SuSE Linux 7.3
  • Trustix Secure Linux 1.01
  • Trustix Secure Linux 1.1
  • Trustix Secure Linux 1.2
  • Trustix Secure Linux 1.5

Reported:

Oct 18, 2001

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page