2012.Január 24.(K) 02:35 időpontban Francesco R.(vivo) ezt írta: > On Tuesday 24 January 2012 00:49:19 Tóth Attila wrote: >> Please take a look at on this exploit: >> http://blog.zx2c4.com/749 >> It is interesting to think about /proc/pid/mem protection and about >> building su with PIE enabled... >> >> Regards: >> Dw. > > BTW this in "vanilla" gentoo does not work because of the permission of > the su > file: > ls -l /usr/bin/su > -rws--x--x 1 root root 36776 18 gen 21.31 /usr/bin/su > > readelf cannot read the address, but there can be other ways to access the > binary for example for group "disk" > > hardened gentoo is un-affected as expected (but you already know) >
So this exploit is a good example on why hardened gentoo is beneficial. -- dr Tóth Attila, Radiológus, 06-20-825-8057 Attila Toth MD, Radiologist, +36-20-825-8057