Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAHmME9pdxOeQ4WnT_WPTbt5MKCJ158DJHGH8M8=-J3HyL_Y86Q@mail.gmail.com>
Date: Thu, 9 Feb 2012 03:15:56 +0100
From: "Jason A. Donenfeld" <Jason@...c4.com>
To: oss-security@...ts.openwall.com
Subject: Re: Linux procfs infoleaks via self-read by a
 SUID/SGID program (was: CVE-2011-3637 Linux kernel: proc: fix Oops on invalid
 /proc/<pid>/maps access)

On Thu, Feb 9, 2012 at 00:03, Djalal Harouni <tixxdz@...ndz.org> wrote:

> Hi Solar, Jason,
>
> Nice one Jason, and I've also found this according to this tweet:
> http://twitter.com/#!/tixxdz/status/165818331092365312


http://git.zx2c4.com/CVE-2012-0056/commit/?id=105eded1abc03c5610cf912d4939809b2f06627e

2012-01-25 (for the record)

probably this has been known by a lot of folks for a while though

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.