|
Message-ID: <52EC5FBA.30956.2F7D740B@pageexec.freemail.hu> Date: Sat, 01 Feb 2014 03:45:14 +0100 From: "PaX Team" <pageexec@...email.hu> To: oss-security@...ts.openwall.com, Solar Designer <solar@...nwall.com> Subject: Re: Linux 3.4+: arbitrary write with CONFIG_X86_X32 (CVE-2014-0038) On 1 Feb 2014 at 3:02, Solar Designer wrote: > Google is offering bounties for responsible disclosure of bugs in > Google's software, and I guess this includes use of Linux kernel by > Chromium OS. exactly, and the same bugtracker is used for all chrom* products (somewhat confusingly btw, as there's no kernel category for example when one opens a bug ;). > (I don't know if this specific vulnerability was relevant > to Google's products, i was told that x32 wasn't enabled anywhere (yet, anyway) so they aren't affected. > http://googleonlinesecurity.blogspot.com/2013/10/going-beyond-vulnerability-rewards.html > > ... but finding a vulnerability would probably not fall under the latter > program. yes, that's a somewhat different kettle of fish though bugfixes may be eligible if it's about fixing or mitigating entire classes (not the case here obviously).
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.