Below is the source code of the ia32 program mentioned in the bug report. It is supposed to be SUID root.
#include <sys/types.h> #include <unistd.h> #include <stdio.h> #include <errno.h> #include <string.h> const char my_chroot[] = "/var/chroot/sid-ia32"; int main(const int argc, char *argv[]) { int r; r = chroot(my_chroot); /* Do not need to be root any more. */ setuid(getuid()); if(r < 0) { fprintf(stderr, "%s: Failed to chroot to: `%s'\n", strerror(errno), my_chroot); return 1; } if(argc <= 1) { char *cmd[2]; cmd[0] = "/bin/bash"; cmd[1] = NULL; execvp(cmd[0], cmd); fprintf(stderr, "%s: Failed to execute command '%s'.\n", strerror(errno), cmd[0]); } else { execvp(argv[1], argv + 1); fprintf(stderr, "%s: Failed to execute command '%s'.\n", strerror(errno), argv[1]); } return 1; } -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]