[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] CVE request: kernel: proc: clean up and fix /proc/<pid>/mem handling
From:       Eugene Teo <eugene () redhat ! com>
Date:       2012-01-24 2:13:13
Message-ID: 4F1E13B9.2070402 () redhat ! com
[Download RAW message or body]

On 01/20/2012 10:52 PM, Eugene Teo wrote:
> On 01/19/2012 12:05 PM, Eugene Teo wrote:
>> On 01/19/2012 04:43 AM, Kees Cook wrote:
>>> What's the problem with the old logic in the mem handling? (Why does this
>>> need a CVE?)
>>
>> This is a possible local privilege escalation issue on a system with
>> ASLR disabled, combined with other exploitation techniques.
> 
> Detailed information can be found here,
> https://access.redhat.com/kb/docs/DOC-69129

We have released an update for Red Hat Enterprise Linux 6,
https://rhn.redhat.com/errata/RHSA-2012-0052.html.

Please update the kernel as soon as possible.

PS: On Red Hat Enterprise Linux 6, /bin/su (coreutils) and
/usr/bin/gpasswd (shadow-utils) are protected at compile time by PIE.

Thanks, Eugene
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic