Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 15 Apr 2010 08:37:41 +0800
From: Eugene Teo <>
CC: Michael Gilbert <>,
Subject: CVE request: kernel: tty: release_one_tty() forgets to put pids

On 04/15/2010 08:23 AM, Michael Gilbert wrote:
> On Wed, 14 Apr 2010 11:20:00 +0800 Eugene Teo wrote:
>> 2) tty: release_one_tty() forgets to put pids
>> Not sure this issue can be triggered by a non-privileged user.
> this one should get a CVE id i think.  looking at only two data points
> (2.6.26 and 2.6.32), i've found the vulnerable code present in both.
> if i'm not mistaken, redhat has had supported releases in that range.

Was discussing this with another colleague, that it seems possible to 
trigger this issue with a non-privileged user. And yes, I agree that 
this should have a CVE name assigned. Thanks.


Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ