Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <4BC53460.6040903@kernel.sg>
Date: Wed, 14 Apr 2010 11:20:00 +0800
From: Eugene Teo <eugeneteo@...nel.sg>
To: oss-security@...ts.openwall.com
CC: coley@...re.org
Subject: Couple of kernel issues

1) oom: fix the unsafe usage of badness() in proc_oom_score()
https://bugzilla.redhat.com/show_bug.cgi?id=582068
http://git.kernel.org/linus/b95c35e76b29ba812e5dabdd91592e25ec640e93
upstream commit 28b83c51 (v2.6.32-rc1) introduced the problem.

2) tty: release_one_tty() forgets to put pids
https://bugzilla.redhat.com/show_bug.cgi?id=582076
http://git.kernel.org/linus/6da8d866d0d39e9509ff826660f6a86a6757c966
Not sure this issue can be triggered by a non-privileged user.

Not requesting CVE names for these as these did not affect our supported 
kernels. Just FYI.

Thanks, Eugene

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.