|
Message-ID: <20141211182730.GA11928@kroah.com> Date: Thu, 11 Dec 2014 13:27:30 -0500 From: Greg KH <greg@...ah.com> To: oss-security@...ts.openwall.com Subject: Re: PIE bypass using VDSO ASLR weakness On Thu, Dec 11, 2014 at 06:23:23PM +0100, Hanno Böck wrote: > On Thu, 11 Dec 2014 11:15:44 +0530 > Reno Robert <renorobert@...il.com> wrote: > > > Given that ASLR is not effective in VDSO and comes down to 11 quality > > bits as per pax test making return-to-vdso feasible even for PIE > > binary, whether this should be considered as a bug and CVE be > > assigned? > > I opened a bug in the kernel's bugtracker: > https://bugzilla.kernel.org/show_bug.cgi?id=89591 Don't do that, stick to the linux-kernel mailing list, cc:ing the proper developers involved. I say this as most kernel subsystems do not use bugzilla.kernel.org (USB and Networking are two examples), while others use it heavily (like ACPI). For "core" issues like this, stick to the mailing lists, they work better. Actually, for "security" stuff, use the security@...nel.org alias, that's the best way to get a quick response. thanks, greg k-h
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.