April 10, 2001

Security advisory for execve/ptrace

Author: JT Smith

From LWN.net
: Linux kernels before 2.2.19 are vulnerable to a local root exploit.

This vulnerability exploits a race condition in the 2.2.x Linux kernel
within the execve() system call.

By predicting the child-process sleep() within execve(), an attacker
can use ptrace() or similar mechanisms to subvert control of the child
process. If the child process is setuid, the attacker can cause the
child process to execute arbitrary code at an elevated privilege.


  • Linux
Click Here!