| Summary: | Kernel: sys-kernel/hardened sources - privilege escalation (CVE-2007-0257) | ||
|---|---|---|---|
| Product: | Gentoo Security | Reporter: | Daniel Black (RETIRED) <dragonheart> |
| Component: | Kernel | Assignee: | Gentoo Security <security> |
| Status: | RESOLVED FIXED | ||
| Severity: | normal | CC: | hardened-kernel+disabled, sharpshopter |
| Priority: | High | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | http://grsecurity.net/news.php#digitalpoc | ||
| Whiteboard: | [hardened < 2.4.34] [hardened > 2.6 < 2.6.19-r5] | ||
| Package list: | Runtime testing required: | --- | |
|
Description
Daniel Black (RETIRED)
2007-02-07 11:58:01 UTC
This bug no longer applies to any hardened-sources in portage and should be closed. Good catch. CVE-2007-0257: Unspecified vulnerability in the expand_stack function in grsecurity PaX allows local users to gain privileges via unspecified vectors. NOTE: the grsecurity developer has disputed this issue, stating that "the function they claim the vulnerability to be in is a trivial function, which can, and has been, easily checked for any supposed vulnerabilities." The developer also cites a past disclosure that was not proven. As of 20070120, the original researcher has released demonstration code. |