[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: Re: [oss-security] CVE request: kernel: proc: clean up and fix /proc/<pid>/mem handling
From: Eugene Teo <eugene () redhat ! com>
Date: 2012-01-24 2:13:13
Message-ID: 4F1E13B9.2070402 () redhat ! com
[Download RAW message or body]
On 01/20/2012 10:52 PM, Eugene Teo wrote:
> On 01/19/2012 12:05 PM, Eugene Teo wrote:
>> On 01/19/2012 04:43 AM, Kees Cook wrote:
>>> What's the problem with the old logic in the mem handling? (Why does this
>>> need a CVE?)
>>
>> This is a possible local privilege escalation issue on a system with
>> ASLR disabled, combined with other exploitation techniques.
>
> Detailed information can be found here,
> https://access.redhat.com/kb/docs/DOC-69129
We have released an update for Red Hat Enterprise Linux 6,
https://rhn.redhat.com/errata/RHSA-2012-0052.html.
Please update the kernel as soon as possible.
PS: On Red Hat Enterprise Linux 6, /bin/su (coreutils) and
/usr/bin/gpasswd (shadow-utils) are protected at compile time by PIE.
Thanks, Eugene
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic