Gentoo Archives: gentoo-hardened

From: pageexec@××××××××.hu
To: gentoo-hardened@l.g.o
Subject: Re: [gentoo-hardened] Interesting: CVE-2012-0056
Date: Tue, 24 Jan 2012 08:27:24
Message-Id: 4F1E6B47.27728.1C60A1EE@pageexec.freemail.hu
In Reply to: Re: [gentoo-hardened] Interesting: CVE-2012-0056 by "Francesco R.(vivo)"
1 On 24 Jan 2012 at 2:35, Francesco R.(vivo) wrote:
2
3 > BTW this in "vanilla" gentoo does not work because of the permission of the su
4 > file:
5 > ls -l /usr/bin/su
6 > -rws--x--x 1 root root 36776 18 gen 21.31 /usr/bin/su
7 >
8 > readelf cannot read the address, but there can be other ways to access the
9 > binary for example for group "disk"
10
11 http://seclists.org/fulldisclosure/2012/Jan/396
12
13 > hardened gentoo is un-affected as expected (but you already know)
14
15 this is not quite true, what could work against grsec is an exploit that
16 implemented a ret2libc style exploit coupled with bruteforcing (if the
17 target suid is a PIE). i hope you're all enabling the bruteforce protection
18 feature in grsec ;).

Replies

Subject Author
Re: [gentoo-hardened] Interesting: CVE-2012-0056 "Tóth Attila" <atoth@××××××××××.hu>