OpenBSD Journal

[SECURITY] Patch 011 for 3.1: pppd

Contributed by jose on from the race-condition dept.

OK, to start off this slew of security patches today, Patch 011 for OpenBSD 3.1 fixes a race condition in pppd(8) . This would allow an attacker to modify arbitrary files on the system. The patch migrates from chmod(2) to fchmod(2), which takes a file descriptor rather than rather than a character path to the file.

(Comments are closed)


Comments
  1. By Anonymous Coward () on

    Looking in the code for pppd in NetBSD, this change is already there...but with extra code - a lot of it too.

    I wonder if this is a bug that could have been eliminated with more current pppd code :-o

  2. By Anonymous Coward () on

    Damn it, I wish there was some information about under which conditions these exploits matter. I mean, if you don't use pppd, do you care? Is "rm /usr/sbin/pppd" good enough?

  3. By Anonymous Coward () on

    Hallo I don't understand enough: when I wnat patch 3.1 (eg this pppd) is sufficient cvs update this aplication in some src tree and recompile ONLY this pppd and install it?
    (I haven't enough powerful computer for rebuilding whole system...)

    Can be anything broken by this way?
    TIA
    D.

Credits

Copyright © - Daniel Hartmeier. All rights reserved. Articles and comments are copyright their respective authors, submission implies license to publish on this web site. Contents of the archive prior to as well as images and HTML templates were copied from the fabulous original deadly.org with Jose's and Jim's kind permission. This journal runs as CGI with httpd(8) on OpenBSD, the source code is BSD licensed. undeadly \Un*dead"ly\, a. Not subject to death; immortal. [Obs.]