Gentoo Archives: gentoo-hardened

From: "Tóth Attila" <atoth@××××××××××.hu>
To: gentoo-hardened@l.g.o
Subject: Re: [gentoo-hardened] Interesting: CVE-2012-0056
Date: Tue, 24 Jan 2012 07:38:41
Message-Id: ba6fdb1b88c1ecc93bf404993229f781.squirrel@atoth.sote.hu
In Reply to: Re: [gentoo-hardened] Interesting: CVE-2012-0056 by "Francesco R.(vivo)"
1 2012.Január 24.(K) 02:35 időpontban Francesco R.(vivo) ezt írta:
2 > On Tuesday 24 January 2012 00:49:19 Tóth Attila wrote:
3 >> Please take a look at on this exploit:
4 >> http://blog.zx2c4.com/749
5 >> It is interesting to think about /proc/pid/mem protection and about
6 >> building su with PIE enabled...
7 >>
8 >> Regards:
9 >> Dw.
10 >
11 > BTW this in "vanilla" gentoo does not work because of the permission of
12 > the su
13 > file:
14 > ls -l /usr/bin/su
15 > -rws--x--x 1 root root 36776 18 gen 21.31 /usr/bin/su
16 >
17 > readelf cannot read the address, but there can be other ways to access the
18 > binary for example for group "disk"
19 >
20 > hardened gentoo is un-affected as expected (but you already know)
21 >
22
23 So this exploit is a good example on why hardened gentoo is beneficial.
24 --
25 dr Tóth Attila, Radiológus, 06-20-825-8057
26 Attila Toth MD, Radiologist, +36-20-825-8057