Date: Sun, 21 May 2000 14:08:47 -0400 From: "Crist J. Clark" <cjc@cc942873-a.ewndsr1.nj.home.com> To: freebsd-security@freebsd.org Subject: The procfs Hole in 2.2.8-STABLE? Message-ID: <20000521140847.G96573@cc942873-a.ewndsr1.nj.home.com>
next in thread | raw e-mail | index | archive | help
I just want to verify something before I cause myself some pain. From the wording of FreeBSD-SA-00:01, ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:02.procfs.asc Am I to take it that 2.2.8-STABLE would be vulnerable? The following seems to imply it, "Unfortunately, throughout these three years it was still possible to abuse /proc/pid/mem in a similar, though more complicated fashion, which could lead to local root compromise." Since the 2.2.x branch was the RELEASE and STABLE branch for a good part of that three years. It just occured to me recently that the UW IMAP vulnerability that allows users to get a shell combined with a procfs hole would be a Bad Thing on an old 2.2.8-STABLE mailserver I have. I'm not going to go through the pain of upgrading the OS that machine except for security reasons (it's been fine for two years, why fix what ain't broke). Do I need to do upgrade it? Maybe I'll just umount /proc. -- Crist J. Clark cjclark@home.com To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000521140847.G96573>