1 |
On Tuesday 24 January 2012 00:49:19 Tóth Attila wrote: |
2 |
> Please take a look at on this exploit: |
3 |
> http://blog.zx2c4.com/749 |
4 |
> It is interesting to think about /proc/pid/mem protection and about |
5 |
> building su with PIE enabled... |
6 |
> |
7 |
> Regards: |
8 |
> Dw. |
9 |
|
10 |
BTW this in "vanilla" gentoo does not work because of the permission of the su |
11 |
file: |
12 |
ls -l /usr/bin/su |
13 |
-rws--x--x 1 root root 36776 18 gen 21.31 /usr/bin/su |
14 |
|
15 |
readelf cannot read the address, but there can be other ways to access the |
16 |
binary for example for group "disk" |
17 |
|
18 |
hardened gentoo is un-affected as expected (but you already know) |