Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 269355

Summary: Kernel: proc: avoid information leaks to non-privileged processes (GENERIC-MAP-NOMATCH)
Product: Gentoo Security Reporter: Jim Faulkner <dogshu>
Component: KernelAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: normal CC: hardened-kernel+disabled, kernel
Priority: High    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f83ce3e6b02d5e48b3a43b001390e2b58820389d
Whiteboard: [linux <2.6.27.23] [linux >=2.6.28 <2.6.29.3] [gp < 2.6.29-6]
Package list:
Runtime testing required: ---

Description Jim Faulkner 2009-05-11 02:28:44 UTC
It was recently reported that there are some vulnerabilities in the Linux kernel that can allow someone to bypass address space layout randomization (ALSR):
http://lwn.net/Articles/330866/

This is fixed in 2.6.29.3 (see commit f83ce3e6b02d5e48b3a43b001390e2b58820389d):
ftp://ftp.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.29.3


Reproducible: Always