|
Message-ID: <alpine.LFD.2.02.1210191749330.11210@wniryva.cad.erqung.pbz> Date: Fri, 19 Oct 2012 17:58:12 +0530 (IST) From: P J P <ppandit@...hat.com> To: oss-security@...ts.openwall.com cc: me@...fdog.net Subject: CVE Request -- kernel stack disclosure in binfmt_script load_script() -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 A memory disclosure flaw has been found in the way binfmt_script load_script() function handled excessive recursions. An unprivileged local user could use this flaw to leak kernel memory. Proposed upstream fix: - https://lkml.org/lkml/2012/9/23/29 References: - https://lkml.org/lkml/2012/8/18/75 - http://www.halfdog.net/Security/2012/LinuxKernelBinfmtScriptStackDataDisclosure/ Thank you. - -- Prasad J Pandit / Red Hat Security Response Team DB7A 84C5 D3F9 7CD1 B5EB C939 D048 7860 3655 602B -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBAgAGBQJQgUdcAAoJENBIeGA2VWArvqwP/iGzUS3S8CeCS2a12rqS+rth 0V5aGT2oSC7g8R6d9DzbfS/u3U9+QUQDImkPv7KvREWUBYIrFy8v+qSy3DgdUq9e H700gLvgIj50IrEo807optzM7MtHuQY8RUMZL/IMPeLr55gvH9P3f9abDbTVjHTI fnihwpCpzSHmuUALWGKDRH1PG2ZvW8KrxL8Iw7HoQLIK+RPvtWMtGoqdI1fRslW1 1em+3oM9vexYT1vWvPDTWDAvrbzG/l5x4FCOAwl6dS9GrhDtaFDUaX87jgZE+P+Z uk0u9rD4Q1wg6iQSHHTHWFGosTJs4UQLDPvAd6Y1U+I+H4AIg6+SeYqTIEzm+C9l hgM3086Ur5bRlyhryMzbozGBRnoo+Az5SscZLIdP9Xir8P7KcUdsH6LZprwe2GGs zrFlSwiGVjf7Br/B9HKAeimzc3VS5hVuA78AAUDTAFin2Y8QLl51+srduIhmQ9Fx TTFRal1nWZMsx9KWbzAFr2FCicWYvhfrCx55HPX4NHwNI/8tMCG/YWglEq1y3pbf Cl8dNCdYPBN0VLvAOEb/uOwLkww9zJyQKhI7ezVGRuBVVpCnW6I7wmAQiNWE/L/W WDkE7nUR96OHRmcY18Tlt/SaGkRHXeG1epaTvEhE1+/Ca6tN0dZZznG0XpScUAId w215frss3fNKnN8vkvlB =gVkm -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.