oss-sec mailing list archives

Re: CVE-Request -- Linux ASLR integer overflow


From: Kees Cook <keescook () chromium org>
Date: Sat, 14 Feb 2015 09:40:56 -0800

On Fri, Feb 13, 2015 at 02:56:55PM +0100, Hector Marco wrote:
Hi,

It worth metion that the patch was already sent:

https://lkml.org/lkml/2015/1/7/811

I've sent this patch again, after cleaning it up further:
https://lkml.org/lkml/2015/2/14/61

Thanks for working on this!

-Kees



Hector Marco.
http://hmarco.org


El 13/02/15 a las 13:26, Hector Marco escribió:
Hi,

A bug in Linux ASLR implementation for versions prior to 3.19-rc3 has
been found. The issue is that the stack for processes is not properly
randomized on some 64 bit architectures due to an integer overflow.

Affected systems have reduced the stack entropy of the processes by four.


Details at:
http://hmarco.org/bugs/linux-ASLR-integer-overflow.html



Could you please assign a CVE-ID for this?



Hector Marco.
http://hmarco.org

Cyber-security researcher at
http://cybersecurity.upv.es/
-- 
Kees Cook


Current thread: