Your message dated Tue, 29 Nov 2005 10:47:11 -0800
with message-id <[EMAIL PROTECTED]>
and subject line Bug#329087: fixed in kernel-patch-vserver 2.3
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 19 Sep 2005 13:29:07 +0000
>From [EMAIL PROTECTED] Mon Sep 19 06:29:07 2005
Return-path: <[EMAIL PROTECTED]>
Received: from tlug.sinica.edu.tw (mail.linux.org.tw) [140.109.13.42] 
        by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
        id 1EHLhj-0003zn-00; Mon, 19 Sep 2005 06:29:07 -0700
Received: from localhost (localhost [127.0.0.1])
        by mail.linux.org.tw (Postfix) with ESMTP id 3ED06BC064;
        Mon, 19 Sep 2005 21:29:01 +0800 (CST)
Received: from mail.linux.org.tw ([10.0.0.3])
        by localhost (people [10.0.0.3]) (amavisd-new, port 10024) with LMTP
        id 05029-01-4; Mon, 19 Sep 2005 21:29:01 +0800 (CST)
Received: from tnlug.linux.org.tw (tnlug.linux.org.tw [140.109.13.50])
        by mail.linux.org.tw (Postfix) with ESMTP id 2ACF2BC063;
        Mon, 19 Sep 2005 21:29:01 +0800 (CST)
Received: by tnlug.linux.org.tw (Postfix, from userid 1001)
        id A084C7F599; Mon, 19 Sep 2005 21:29:06 +0800 (CST)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Andrew Lee <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: kernel-patch-vserver: be able to do chroot escape
X-Mailer: reportbug 3.17
Date: Mon, 19 Sep 2005 21:29:06 +0800
X-Debbugs-Cc: [EMAIL PROTECTED], [EMAIL PROTECTED],
        Debian Security Team <[EMAIL PROTECTED]>
Message-Id: <[EMAIL PROTECTED]>
X-Virus-Scanned: by amavisd-new-20030616-p10 (Debian) at linux.org.tw
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-11.0 required=4.0 tests=BAYES_00,HAS_PACKAGE,
        X_DEBBUGS_CC autolearn=ham version=2.60-bugs.debian.org_2005_01_02

Package: kernel-patch-vserver
Severity: critical
Tags: sarge
Justification: root security hole

Dear maintainer(s),

I found the kernel-patch-vserver and util-vserver in sarge can not pass
the testfs.sh script[1] which provide by upstream author. After some more
tests, upstream author discoveryed this is a security hole.

Here is what I did in my test:
# ls -lda /var/lib/vservers/XXXX/..
d---------  8 root root 4096 Sep 19 19:46 /var/lib/vservers/XXXX/../
# showattr -d /var/lib/vservers/XXXX/..
---BU-- /var/lib/vservers/XXXX/..
# lsattr -d /var/lib/vservers/XXXX/..
---------------t- /var/lib/vservers/XXXX/..

ssh into a guest and then starting the root exploit[2] inside a guest now
gives: Exploit seems to work. =)

And then I can be able to access the host, can be able to read /etc/shadow
and can be able to create /test.txt in the host.

[1] http://vserver.13thfloor.at/Stuff/SCRIPT/testfs.sh-0.09
[2] http://vserver.13thfloor.at/Stuff/rootesc.c

-- System Information:
Debian Release: 3.1
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.4.27-10vserver
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)

---------------------------------------
Received: (at 329087-close) by bugs.debian.org; 29 Nov 2005 18:51:23 +0000
>From [EMAIL PROTECTED] Tue Nov 29 10:51:23 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 4.50)
        id 1EhAVT-0002Aa-Hf; Tue, 29 Nov 2005 10:47:11 -0800
From: Micah Anderson <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.60 $
Subject: Bug#329087: fixed in kernel-patch-vserver 2.3
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Tue, 29 Nov 2005 10:47:11 -0800
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: kernel-patch-vserver
Source-Version: 2.3

We believe that the bug you reported is fixed in the latest version of
kernel-patch-vserver, which is due to be installed in the Debian FTP archive:

kernel-patch-vserver_2.3.dsc
  to pool/main/k/kernel-patch-vserver/kernel-patch-vserver_2.3.dsc
kernel-patch-vserver_2.3.tar.gz
  to pool/main/k/kernel-patch-vserver/kernel-patch-vserver_2.3.tar.gz
kernel-patch-vserver_2.3_all.deb
  to pool/main/k/kernel-patch-vserver/kernel-patch-vserver_2.3_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Micah Anderson <[EMAIL PROTECTED]> (supplier of updated kernel-patch-vserver 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 29 Nov 2005 13:29:38 -0500
Source: kernel-patch-vserver
Binary: kernel-patch-vserver
Architecture: source all
Version: 2.3
Distribution: unstable
Urgency: high
Maintainer: Micah Anderson <[EMAIL PROTECTED]>
Changed-By: Micah Anderson <[EMAIL PROTECTED]>
Description: 
 kernel-patch-vserver - context switching virtual private servers - kernel patch
Closes: 329087
Changes: 
 kernel-patch-vserver (2.3) unstable; urgency=high
 .
   * Previous fix was missing one IS_IMMUTABLE_FILE instance,
     thanks to Alexei Chetroi (Closes: #329087)
Files: 
 43fb001ad50413d7f8e182ec28aab8aa 602 devel extra kernel-patch-vserver_2.3.dsc
 1017bddd6201f75f5565b3f8019e31c9 1614838 devel extra 
kernel-patch-vserver_2.3.tar.gz
 ffc048e5a31646ddb026966986a29b18 595808 devel extra 
kernel-patch-vserver_2.3_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDjJ609n4qXRzy1ioRAgp3AJ9Vm+/1txKunOUmuQnhsUnQNYRRTgCfSe1B
uidD5YmoGqpEi6/O8JqFZ4o=
=d7Tq
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to