Description of problem: from Gentoo bugzilla: https://bugs.gentoo.org/show_bug.cgi?id=209460 Version-Release number of selected component (if applicable): at least 2.6.18-53.1.4.el5 and 2.6.18-53.1.6.el5 How reproducible: always Steps to Reproduce: 1. get the sourcecode for the proof-of-concept exploit 2. compile with gcc <source.c> 3. run the program Actual results: Granted a root shell Expected results: Should not grant root shell Additional info: enabling pam_wheel from /etc/pam.d/su prevents users not in wheel (or defined) group getting root shell but instead may cause kernel panic
Duplicate to #432251
*** This bug has been marked as a duplicate of 432251 ***