Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <79EF808D-1EB1-496E-875E-003FF44B6B12@oracle.com>
Date: Thu, 12 Nov 2020 18:10:46 +0000
From: John Haxby <john.haxby@...cle.com>
To: oss-security@...ts.openwall.com
Subject: CVE-2014-4508

Hello,

This is an old CVE but it was recently "rediscovered" [1].

CVE-2014-4508 is a memory leak in the auditing subsystem in the kernel.  On old 32 bit linux kernels that don't have [2] this memory leak turns out to be quite bad: you can trigger an out of memory condition that the system cannot recover from not matter how hard it tries.

If you believe you have such a kernel, please get in touch with me directly.

jch




[1] Thanks to Dan Moulding for bringing this to our attention
[2] 554086d85e71 ("x86_32, entry: Do syscall exit work on badsys (CVE-2014-4508)")

Download attachment "signature.asc" of type "application/pgp-signature" (269 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.