Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 19 Oct 2012 10:47:07 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: P J P <ppandit@...hat.com>, me@...fdog.net
Subject: Re: CVE Request -- kernel stack disclosure in binfmt_script
 load_script()

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 10/19/2012 06:28 AM, P J P wrote:
> 
> A memory disclosure flaw has been found in the way binfmt_script 
> load_script() function handled excessive recursions. An
> unprivileged local user could use this flaw to leak kernel memory.
> 
> Proposed upstream fix: - https://lkml.org/lkml/2012/9/23/29
> 
> References: - https://lkml.org/lkml/2012/8/18/75 - 
> http://www.halfdog.net/Security/2012/LinuxKernelBinfmtScriptStackDataDisclosure/
>
> 
> 
> Thank you.

Please use CVE-2012-4530 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://www.enigmail.net/
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=Opno
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.