Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 02 Oct 2008 09:22:54 +0800
From: Eugene Teo <eteo@...hat.com>
To: oss-security@...ts.openwall.com
Subject: CVE-2008-3832 kernel: null pointer dereference in utrace_control

Michael Simms reported that it is possible for an unprivileged user to
crash the machine by running gdb on a running process with pid 1.

This affects the version of utrace as shipped with Fedora 8 and 9. This
is addressed in kernel-2.6.26.5-28 for Fedora 8, and kernel-2.6.26.5-45
for Fedora 9. This issue is specific to Fedora, and does not affect
upstream or any of the Red Hat Enterprise Linux kernels.

References:
http://kerneloops.org/oops.php?number=56705
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-3832

Thanks, Eugene
-- 
Eugene Teo / Red Hat Security Response Team

View attachment "patch" of type "text/plain" (608 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ