Secunia Security Advisory - Tino Keitel has reported a security issue in RunIt, which potentially can cause a process to run with escalated group privileges.
fa12f671ca0821200907b8c51dca3ce18656fb624f260ac975f9ad2a9b9e9a93
TITLE:
RunIt "chpst" Multiple Groups Handling Security Issue
SECUNIA ADVISORY ID:
SA19323
VERIFY ADVISORY:
http://secunia.com/advisories/19323/
CRITICAL:
Less critical
IMPACT:
Privilege escalation
WHERE:
Local system
SOFTWARE:
runit 1.x
http://secunia.com/product/8850/
DESCRIPTION:
Tino Keitel has reported a security issue in RunIt, which potentially
can cause a process to run with escalated group privileges.
The security issue is caused due to an integer type definition error
in "uidgid.h". This can cause the group permissions of a process to
be incorrect changed to the "root" group when "chpst" is used to set
the permissions of a process using the "-u" option with multiple
group names.
Successful exploitation requires that "chpst" is compiled against the
dietlibc library.
The security issue has been reported in version 1.3.3 and affects
only the x86 platform. Other versions may also be affected.
SOLUTION:
Update to version 1.4.1.
http://smarden.org/runit/install.html
PROVIDED AND/OR DISCOVERED BY:
Tino Keite
ORIGINAL ADVISORY:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=356016
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------