From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751772AbdGEOR7 (ORCPT ); Wed, 5 Jul 2017 10:17:59 -0400 Received: from mother.openwall.net ([195.42.179.200]:61412 "HELO mother.openwall.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with SMTP id S1751626AbdGEOR6 (ORCPT ); Wed, 5 Jul 2017 10:17:58 -0400 X-Greylist: delayed 401 seconds by postgrey-1.27 at vger.kernel.org; Wed, 05 Jul 2017 10:17:57 EDT Date: Wed, 5 Jul 2017 16:11:06 +0200 From: Solar Designer To: "kseifried@redhat.com" Cc: Ben Hutchings , Michal Hocko , Willy Tarreau , Linus Torvalds , Hugh Dickins , Oleg Nesterov , "Jason A. Donenfeld" , Rik van Riel , Larry Woodman , "Kirill A. Shutemov" , Tony Luck , "James E.J. Bottomley" , Helge Diller , James Hogan , Laura Abbott , Greg KH , "security@kernel.org" , Qualys Security Advisory , LKML , Ximin Luo Subject: Re: [vs-plain] Re: [PATCH] mm: larger stack guard gap, between vmas Message-ID: <20170705141106.GA31670@openwall.com> References: <1499209315.2707.29.camel@decadent.org.uk> <947174c4-27c8-0f14-28d2-cabfd3ef2625@redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <947174c4-27c8-0f14-28d2-cabfd3ef2625@redhat.com> User-Agent: Mutt/1.4.2.3i Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi all, On Tue, Jul 04, 2017 at 07:16:06PM -0600, kseifried@redhat.com wrote: > This issue occurs post stackguard patches correct? Fixing it sounds like > this might go beyond hardening and into CVE territory. Since this thread is public on LKML, as it should be, it's no longer valid to be CC'ed to linux-distros, which is for handling of embargoed issues only. So please drop linux-distros from further CC's (I moved linux-distros to Bcc on this reply, just so they know what happened). If specific security issues are identified (such as with LibreOffice and Java), then ideally those should be posted to oss-security as separate reports. I'd appreciate it if anyone takes care of that (regardless of CVE worthiness). In fact, I already mentioned this thread in: http://www.openwall.com/lists/oss-security/2017/07/05/11 Thank you! Alexander