|
Message-ID: <4BC53460.6040903@kernel.sg> Date: Wed, 14 Apr 2010 11:20:00 +0800 From: Eugene Teo <eugeneteo@...nel.sg> To: oss-security@...ts.openwall.com CC: coley@...re.org Subject: Couple of kernel issues 1) oom: fix the unsafe usage of badness() in proc_oom_score() https://bugzilla.redhat.com/show_bug.cgi?id=582068 http://git.kernel.org/linus/b95c35e76b29ba812e5dabdd91592e25ec640e93 upstream commit 28b83c51 (v2.6.32-rc1) introduced the problem. 2) tty: release_one_tty() forgets to put pids https://bugzilla.redhat.com/show_bug.cgi?id=582076 http://git.kernel.org/linus/6da8d866d0d39e9509ff826660f6a86a6757c966 Not sure this issue can be triggered by a non-privileged user. Not requesting CVE names for these as these did not affect our supported kernels. Just FYI. Thanks, Eugene
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.