Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 21 Jun 2017 10:06:39 -0600
From: "kseifried@...hat.com" <kseifried@...hat.com>
To: oss-security@...ts.openwall.com, Stuart Henderson <stu@...cehopper.org>
Subject: Re: Qualys Security Advisory - The Stack Clash



On 06/21/2017 09:15 AM, Stuart Henderson wrote:
> On 2017/06/21 16:36, Solar Designer wrote:
>>                                                 Granted, they can now
>> prepare their updates within hours or days due to the work done by SUSE,
>> Red Hat, and others on the distros list, hopefully in time before
>> attacks using the Qualys findings start or become widespread, but
>> nevertheless they are at a disadvantage.
> 
> People doing this might want to note that Icinga ran into problems
> with the fix in RHEL/Centos kernels when using setrlimit to restrict
> the stack size below the default.
> 
> The Red Hat ticket is currently locked but there's some information at
> https://bugs.centos.org/view.php?id=13453.

Ah sorry about that, I've made

https://bugzilla.redhat.com/show_bug.cgi?id=1463241

public, kernel bugs default to private and then typically get opened up
(mostly because people have a tendency to put traces/dumps with
sensitive information in them and we don't want someone accidentally
exposing their SSH host keys or whatever).

-- 
Kurt Seifried -- Red Hat -- Product Security -- Cloud
PGP A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
Red Hat Product Security contact: secalert@...hat.com

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.