|
Message-ID: <20100208143602.GC12437@suse.de> Date: Mon, 8 Feb 2010 15:36:02 +0100 From: Marcus Meissner <meissner@...e.de> To: OSS Security List <oss-security@...ts.openwall.com> Subject: Re: CVE request: information leak / potential crash in sys_move_pages On Sun, Feb 07, 2010 at 02:50:21AM +0100, Marcus Meissner wrote: > Hi, > > I spotted a problem in sys_move_pages, where "node" value is read from userspace, > but not limited to the node set within the kernel itself. For the record... This was reported to Novell Bugzilla by our business partner IBM as a beta test bug on our Service Pack SLES 11 SP1, from rcvalle@.... The report contained the Ooops backtrace, caused by runs of the "flail" tool, ( http://www.risesecurity.org/ramon/flail-0.1.0.tar.gz ) I spotted this 1 bug in the actual code though and mailed security@...nel.org to get it fixed ASAP for 2.6.33 and our product. Usually IBM wants to just have their bugs fixed, but this seems to be different in this case. So sorry for not giving credit where credit is due. That there was an Oops is however a good indicator that memory corruption is also possible. Ciao, Marcus
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.