Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 24 Jan 2012 10:13:13 +0800
From: Eugene Teo <eugene@...hat.com>
To: oss-security@...ts.openwall.com
CC: "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE request: kernel: proc: clean up and fix /proc/<pid>/mem
 handling

On 01/20/2012 10:52 PM, Eugene Teo wrote:
> On 01/19/2012 12:05 PM, Eugene Teo wrote:
>> On 01/19/2012 04:43 AM, Kees Cook wrote:
>>> What's the problem with the old logic in the mem handling? (Why does this
>>> need a CVE?)
>>
>> This is a possible local privilege escalation issue on a system with
>> ASLR disabled, combined with other exploitation techniques.
> 
> Detailed information can be found here,
> https://access.redhat.com/kb/docs/DOC-69129

We have released an update for Red Hat Enterprise Linux 6,
https://rhn.redhat.com/errata/RHSA-2012-0052.html.

Please update the kernel as soon as possible.

PS: On Red Hat Enterprise Linux 6, /bin/su (coreutils) and
/usr/bin/gpasswd (shadow-utils) are protected at compile time by PIE.

Thanks, Eugene

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ