by Loggy » Tue Jun 15, 2004 3:19 pm
This is a very dangerous program since it can't be stopped yet can be started by any user with access to the C compiler.
There are issues (a) to plug this hole by patching as it is only a one line change - which all sysadmins should clearly do - and (b) how grsecurity copes with this sort of thing.
From PaX's response, grsec won't stop it and this may take time to fix if there is any plan to tackle what could be a general class of security problems.
So two questions:
1 grsec is always based on vanilla kernels. Presumably the next vanilla kernel will include the simple fix. In the meantime, is there any policy about incorporating emergency patches - of any variety - in grsec either in the CVS download versions or by adding this patch to the standard grsec patches?
2 Are there any other such bombs around?