|
Message-ID: <CAHmME9pdxOeQ4WnT_WPTbt5MKCJ158DJHGH8M8=-J3HyL_Y86Q@mail.gmail.com> Date: Thu, 9 Feb 2012 03:15:56 +0100 From: "Jason A. Donenfeld" <Jason@...c4.com> To: oss-security@...ts.openwall.com Subject: Re: Linux procfs infoleaks via self-read by a SUID/SGID program (was: CVE-2011-3637 Linux kernel: proc: fix Oops on invalid /proc/<pid>/maps access) On Thu, Feb 9, 2012 at 00:03, Djalal Harouni <tixxdz@...ndz.org> wrote: > Hi Solar, Jason, > > Nice one Jason, and I've also found this according to this tweet: > http://twitter.com/#!/tixxdz/status/165818331092365312 http://git.zx2c4.com/CVE-2012-0056/commit/?id=105eded1abc03c5610cf912d4939809b2f06627e 2012-01-25 (for the record) probably this has been known by a lot of folks for a while though
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.