Home page logo
/

oss-sec logo oss-sec mailing list archives

Re: CVE request: kernel: proc: clean up and fix /proc/<pid>/mem handling
From: Eugene Teo <eugene () redhat com>
Date: Tue, 24 Jan 2012 10:13:13 +0800

On 01/20/2012 10:52 PM, Eugene Teo wrote:
On 01/19/2012 12:05 PM, Eugene Teo wrote:
On 01/19/2012 04:43 AM, Kees Cook wrote:
What's the problem with the old logic in the mem handling? (Why does this
need a CVE?)

This is a possible local privilege escalation issue on a system with
ASLR disabled, combined with other exploitation techniques.

Detailed information can be found here,
https://access.redhat.com/kb/docs/DOC-69129

We have released an update for Red Hat Enterprise Linux 6,
https://rhn.redhat.com/errata/RHSA-2012-0052.html.

Please update the kernel as soon as possible.

PS: On Red Hat Enterprise Linux 6, /bin/su (coreutils) and
/usr/bin/gpasswd (shadow-utils) are protected at compile time by PIE.

Thanks, Eugene


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]