Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 338025

Summary: 64-bit local root exploit when 32-bit execution is enabled
Product: Gentoo Security Reporter: Richard Freeman <rich0>
Component: KernelAssignee: Gentoo Security <security>
Status: RESOLVED DUPLICATE    
Severity: normal    
Priority: High    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git&a=commitdiff&h=c41d68a513c71e35a14f66d71782d27a79a81ea6
Whiteboard:
Package list:
Runtime testing required: ---

Description Richard Freeman gentoo-dev 2010-09-19 10:58:41 UTC
Stable gentoo kernels are vulnerable to the exploit described in this kernel commit:
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git&a=commitdiff&h=c41d68a513c71e35a14f66d71782d27a79a81ea6

Apologies if there is already a bug tracking this, but I've seen mailing list traffic, blog posts, and slashdot articles, and no security bug.  

Rumor has it that fixes are in the tree:
http://www.mpagano.com/blog/?p=136

Reproducible: Always

Steps to Reproduce:
Comment 1 Alex Legler (RETIRED) archtester gentoo-dev Security 2010-09-19 11:00:51 UTC
There are two issues, tracked in bug 337659 and 337645 respectively.

*** This bug has been marked as a duplicate of bug 337659 ***