Date: Wed, 14 Apr 2010 11:20:00 +0800 From: Eugene Teo <eugeneteo@...nel.sg> To: oss-security@...ts.openwall.com CC: coley@...re.org Subject: Couple of kernel issues 1) oom: fix the unsafe usage of badness() in proc_oom_score() https://bugzilla.redhat.com/show_bug.cgi?id=582068 http://git.kernel.org/linus/b95c35e76b29ba812e5dabdd91592e25ec640e93 upstream commit 28b83c51 (v2.6.32-rc1) introduced the problem. 2) tty: release_one_tty() forgets to put pids https://bugzilla.redhat.com/show_bug.cgi?id=582076 http://git.kernel.org/linus/6da8d866d0d39e9509ff826660f6a86a6757c966 Not sure this issue can be triggered by a non-privileged user. Not requesting CVE names for these as these did not affect our supported kernels. Just FYI. Thanks, Eugene
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ