CVE-2001-1384

ptrace in Linux 2.2.x through 2.2.19, and 2.4.x through 2.4.9, allows local users to gain root privileges by running ptrace on a setuid or setgid program that itself calls an unprivileged program, such as newgrp.
References
Link Resource
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2001-036.0.txt
http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-035-01
http://marc.info/?l=bugtraq&m=100343090106914&w=2
http://marc.info/?l=bugtraq&m=100350685431610&w=2
http://online.securityfocus.com/advisories/3713
http://www.iss.net/security_center/static/7311.php Patch Vendor Advisory
http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-079.php3
http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-082.php3
http://www.linuxsecurity.com/advisories/other_advisory-1650.html Patch Vendor Advisory
http://www.novell.com/linux/security/advisories/2001_036_kernel_txt.html
http://www.redhat.com/support/errata/RHSA-2001-129.html
http://www.redhat.com/support/errata/RHSA-2001-130.html
http://www.securityfocus.com/bid/3447
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2001-036.0.txt
http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-035-01
http://marc.info/?l=bugtraq&m=100343090106914&w=2
http://marc.info/?l=bugtraq&m=100350685431610&w=2
http://online.securityfocus.com/advisories/3713
http://www.iss.net/security_center/static/7311.php Patch Vendor Advisory
http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-079.php3
http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-082.php3
http://www.linuxsecurity.com/advisories/other_advisory-1650.html Patch Vendor Advisory
http://www.novell.com/linux/security/advisories/2001_036_kernel_txt.html
http://www.redhat.com/support/errata/RHSA-2001-129.html
http://www.redhat.com/support/errata/RHSA-2001-130.html
http://www.securityfocus.com/bid/3447
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.2.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.2.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.2.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.2.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.2.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.2.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.2.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.2.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.2.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.2.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.2.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.2.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.2.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.2.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.2.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.2.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.2.17:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.2.18:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.2.19:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*

History

No history.

Information

Published : 2001-10-18 04:00

Updated : 2025-04-03 01:03


NVD link : CVE-2001-1384

Mitre link : CVE-2001-1384

CVE.ORG link : CVE-2001-1384


JSON object : View

Products Affected

linux

  • linux_kernel