[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 20 Mar 2012 09:01:39 -0700
From: Nick Kralevich <nnk@...gle.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request -- kernel: execshield: predictable
ascii armour base address
Can someone explain to me why this is worthy of a CVE? I can see this as a
bug of course. But a "vulnerability"?
This bug, by itself, does not cause a vulnerability. It just makes
vulnerabilities easier to exploit. I'm not sure this is worthy of a CVE
unless we're willing to assign CVEs to all fixed address allocations.
-- Nick
On Tue, Mar 20, 2012 at 6:10 AM, Eugene Teo <eugene@...hat.com> wrote:
> On 03/20/2012 06:20 PM, Petr Matousek wrote:
> > When running a binary with a lot of shared libraries, predictable base
> > address is used for one of the loaded libraries.
> >
> > This flaw could be used to bypass ASLR.
> >
> > References:
> >
> http://scarybeastsecurity.blogspot.com/2012/03/some-random-observations-on-linux-aslr.html
> > https://bugzilla.redhat.com/show_bug.cgi?id=804947
>
> Use CVE-2012-1568.
>
> Eugene
>
--
Nick Kralevich | Android Security | nnk@...gle.com | 650.214.4037
Powered by blists - more mailing lists
Please check out the
Open Source Software Security Wiki, which is counterpart to this
mailing list.
Powered by Openwall GNU/*/Linux -
Powered by OpenVZ