-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 Hi all hardened users.

On Oct. 19, a local privilege escalation exploit was found [1,2] that
affected hardened kernels on all architectures.  For certain
configurations of the hardened kernel, it is possible for a local user
to obtain root privileges.  The current Proof-Of-Concept code can be
frustrated by not providing symbol information via /proc/kallsyms or
System.map,  but at this time it is unclear if other hardening
features such as CONFIG_PAX_MEMORY_UDEREF provide adequate protection
against variations of the POC which do not need symbols.

All users are encouraged to upgrade to hardened-sources-2.6.32-r22
which is currently marked stable on amd64 and x86.  It is being fast
tracked on other archs. [3]

hardened-sources-2.6.35-r4 is also not vulnerable, but cannot be
stabilized yet because of a bug in dhcp which also affects
gentoo-sources-2.6.35-r4. [4]   For those who want kernels > .32 and
can live with the minor bug, you can safely use
hardened-sources-2.6.35-r4.

Later this week, all ebuild for vulnerable kernels will be removed
from the tree, except for hardened-sources-2.6.34-r6
hardened-sources-2.6.32-r9 and hardened-sources-2.6.28-r9.  These will
be kept for continuity.


Ref:

[1] http://www.vsecurity.com/resources/advisory/20101019-1/

[2] http://bugs.gentoo.org/show_bug.cgi?id=341801

[3] http://bugs.gentoo.org/show_bug.cgi?id=341915

[4] http://bugs.gentoo.org/show_bug.cgi?id=334341

- -- 
Anthony G. Basile, Ph.D.
Gentoo Developer
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.16 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkzBc6QACgkQl5yvQNBFVTW5ZACfYee41wo/CB227ZWrt2X5x4sG
vxoAoKGpVvtXB48Sl/urvqqPenjpiq3x
=P+g7
-----END PGP SIGNATURE-----

Reply via email to