[Pkg-utopia-maintainers] Bug#580183: Bug#580183: pid file attack can be used to kill arbitrary processes

Michael Biebl biebl at debian.org
Wed Jul 7 21:38:07 UTC 2010


On 04.05.2010 11:40, Lennart Poettering wrote:
> On Tue, 04.05.10 01:30, Joey Hess (joeyh at debian.org) wrote:
> 
>> Package: avahi-daemon
>> Version: 0.6.25-3
>> Severity: normal
>> Tags; security
>>
>> /var/run/avahi-daemon/pid is writable by the avahi user. Suppose this
>> user is compromised. If the pid is overwritten with a different process
>> id, such as 1, /etc/init.d/avahi-daemon stop will go ahead and kill
>> that.
> 
> Well, I am not too concerned with this issue tbh, given that this file
> is both outside the chroot and we set RLIMIT_FSIZE to 0. Which basically
> means that from inside Avahi you cannot write any file anyway, and
> particularly not that one...

Hi Joey,

given Lennarts explanations, are you ok with closing the bug report or do see a
point in keeping it open?

Michael
-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 262 bytes
Desc: OpenPGP digital signature
URL: <http://lists.alioth.debian.org/pipermail/pkg-utopia-maintainers/attachments/20100707/be926921/attachment.pgp>


More information about the Pkg-utopia-maintainers mailing list