[2719] in bugtraq

home help back first fref pref prev next nref lref last post

[linux-security] Re: Big security hole in kerneld's request_route

daemon@ATHENA.MIT.EDU (Jacques Gelinas)
Fri Jun 14 00:55:01 1996

Date: 	Thu, 13 Jun 1996 17:55:13 -0500
Reply-To: Bugtraq List <BUGTRAQ@NETSPACE.ORG>
From: Jacques Gelinas <jack@solucorp.qc.ca>
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@NETSPACE.ORG>
In-Reply-To:  <199606130421.XAA00723@manifold.algebra.com>

On Wed, 12 Jun 1996 ichudov@algebra.com wrote:

[Mod: Quoting trimmed.  --Jeff.]

> I was just looking at sources of newly released linux 2.0.
> In modules-1.3.69k, in kerneld's subdirectory, there is a file
> request_route.sh (see below). It's supposed to run as root, whenever
> a route is requested. It is supposed to start pppd or something like
> that.
>
> As it appears, it is possible to destroy system philes (such as /etc/passwd
> and so on).

The path should be changed to /var/run/request-route.pid

It is unfortunate that there is no cleaner way to wait for pppd's success
or failure. I mean to do something as simple as

if /usr/sbin/pppd ...
then
        echo ok
else
        echo failure
fi

pppd just fork (goes in background) to soon. Maybe there is already an
option.

 --------------------------------------------------------
Jacques Gelinas (jacques@solucorp.qc.ca)
Use Linux without reformating: Use UMSDOS.

home help back first fref pref prev next nref lref last post