|
Message-ID: <4EF649D6.9050404@redhat.com> Date: Sun, 25 Dec 2011 05:53:26 +0800 From: Eugene Teo <eteo@...hat.com> To: kseifried@...hat.com CC: oss-security@...ts.openwall.com, Moritz Muehlenhoff <jmm@...ian.org>, Vasiliy Kulikov <segoon@...nwall.com> Subject: Re: Status of two Linux kernel issues w/o CVE assignments >> 2: /proc/$PID/{sched,schedstat} information leak >> Vasiliy Kulikov of OpenWall posted a demo exploit. >> http://openwall.com/lists/oss-security/2011/11/05/3 >> >> AFAICS no CVE ID was assigned to this? > > I believe we are not assigning CVE's for these types of proc related > issues, some discussion was had: > > https://lkml.org/lkml/2011/2/7/368 > > http://www.google.com/custom?domains=lkml.org&q=%2Fproc%2F+leaks > > but I'm not sure what the outcome is. CC'ing Eugene Teo. IIRC, it's an issue but there's no resolution as existing code may break. There are also, /proc/{interrupts, stat} https://lkml.org/lkml/2011/11/7/340 /dev/pts/, /dev/tty* https://lkml.org/lkml/2011/11/7/355 I have not checked the status of these issues. Vasiliy, kindly shed some light. Happy holidays. Eugene
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.