|
Message-ID: <54DDED64.2020904@upv.es> Date: Fri, 13 Feb 2015 13:26:12 +0100 From: Hector Marco <hecmargi@....es> To: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: CVE-Request -- Linux ASLR integer overflow Hi, A bug in Linux ASLR implementation for versions prior to 3.19-rc3 has been found. The issue is that the stack for processes is not properly randomized on some 64 bit architectures due to an integer overflow. Affected systems have reduced the stack entropy of the processes by four. Details at: http://hmarco.org/bugs/linux-ASLR-integer-overflow.html Could you please assign a CVE-ID for this? Hector Marco. http://hmarco.org Cyber-security researcher at http://cybersecurity.upv.es/
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.