1 |
On 24 Jan 2012 at 2:35, Francesco R.(vivo) wrote: |
2 |
|
3 |
> BTW this in "vanilla" gentoo does not work because of the permission of the su |
4 |
> file: |
5 |
> ls -l /usr/bin/su |
6 |
> -rws--x--x 1 root root 36776 18 gen 21.31 /usr/bin/su |
7 |
> |
8 |
> readelf cannot read the address, but there can be other ways to access the |
9 |
> binary for example for group "disk" |
10 |
|
11 |
http://seclists.org/fulldisclosure/2012/Jan/396 |
12 |
|
13 |
> hardened gentoo is un-affected as expected (but you already know) |
14 |
|
15 |
this is not quite true, what could work against grsec is an exploit that |
16 |
implemented a ret2libc style exploit coupled with bruteforcing (if the |
17 |
target suid is a PIE). i hope you're all enabling the bruteforce protection |
18 |
feature in grsec ;). |