Date: Tue, 24 Jan 2012 10:13:13 +0800 From: Eugene Teo <eugene@...hat.com> To: oss-security@...ts.openwall.com CC: "Steven M. Christey" <coley@...us.mitre.org> Subject: Re: CVE request: kernel: proc: clean up and fix /proc/<pid>/mem handling On 01/20/2012 10:52 PM, Eugene Teo wrote: > On 01/19/2012 12:05 PM, Eugene Teo wrote: >> On 01/19/2012 04:43 AM, Kees Cook wrote: >>> What's the problem with the old logic in the mem handling? (Why does this >>> need a CVE?) >> >> This is a possible local privilege escalation issue on a system with >> ASLR disabled, combined with other exploitation techniques. > > Detailed information can be found here, > https://access.redhat.com/kb/docs/DOC-69129 We have released an update for Red Hat Enterprise Linux 6, https://rhn.redhat.com/errata/RHSA-2012-0052.html. Please update the kernel as soon as possible. PS: On Red Hat Enterprise Linux 6, /bin/su (coreutils) and /usr/bin/gpasswd (shadow-utils) are protected at compile time by PIE. Thanks, Eugene
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ