Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 19 Oct 2012 10:47:07 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: P J P <ppandit@...hat.com>, me@...fdog.net
Subject: Re: CVE Request -- kernel stack disclosure in binfmt_script
 load_script()

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 10/19/2012 06:28 AM, P J P wrote:
> 
> A memory disclosure flaw has been found in the way binfmt_script 
> load_script() function handled excessive recursions. An
> unprivileged local user could use this flaw to leak kernel memory.
> 
> Proposed upstream fix: - https://lkml.org/lkml/2012/9/23/29
> 
> References: - https://lkml.org/lkml/2012/8/18/75 - 
> http://www.halfdog.net/Security/2012/LinuxKernelBinfmtScriptStackDataDisclosure/
>
> 
> 
> Thank you.

Please use CVE-2012-4530 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://www.enigmail.net/
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=Opno
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ