Gentoo Archives: gentoo-hardened

From: "Francesco R.(vivo)" <vivo75@×××××.com>
To: gentoo-hardened@l.g.o
Subject: Re: [gentoo-hardened] Interesting: CVE-2012-0056
Date: Tue, 24 Jan 2012 01:36:34
Message-Id: 201201240235.39366.vivo75@gmail.com
In Reply to: [gentoo-hardened] Interesting: CVE-2012-0056 by "Tóth Attila"
1 On Tuesday 24 January 2012 00:49:19 Tóth Attila wrote:
2 > Please take a look at on this exploit:
3 > http://blog.zx2c4.com/749
4 > It is interesting to think about /proc/pid/mem protection and about
5 > building su with PIE enabled...
6 >
7 > Regards:
8 > Dw.
9
10 BTW this in "vanilla" gentoo does not work because of the permission of the su
11 file:
12 ls -l /usr/bin/su
13 -rws--x--x 1 root root 36776 18 gen 21.31 /usr/bin/su
14
15 readelf cannot read the address, but there can be other ways to access the
16 binary for example for group "disk"
17
18 hardened gentoo is un-affected as expected (but you already know)

Replies

Subject Author
Re: [gentoo-hardened] Interesting: CVE-2012-0056 "Tóth Attila" <atoth@××××××××××.hu>
Re: [gentoo-hardened] Interesting: CVE-2012-0056 pageexec@××××××××.hu