Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 338025 - 64-bit local root exploit when 32-bit execution is enabled
Summary: 64-bit local root exploit when 32-bit execution is enabled
Status: RESOLVED DUPLICATE of bug 337659
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://git.kernel.org/?p=linux/kernel...
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2010-09-19 10:58 UTC by Richard Freeman
Modified: 2010-09-19 11:00 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Richard Freeman gentoo-dev 2010-09-19 10:58:41 UTC
Stable gentoo kernels are vulnerable to the exploit described in this kernel commit:
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git&a=commitdiff&h=c41d68a513c71e35a14f66d71782d27a79a81ea6

Apologies if there is already a bug tracking this, but I've seen mailing list traffic, blog posts, and slashdot articles, and no security bug.  

Rumor has it that fixes are in the tree:
http://www.mpagano.com/blog/?p=136

Reproducible: Always

Steps to Reproduce:
Comment 1 Alex Legler (RETIRED) archtester gentoo-dev Security 2010-09-19 11:00:51 UTC
There are two issues, tracked in bug 337659 and 337645 respectively.

*** This bug has been marked as a duplicate of bug 337659 ***