Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sat, 6 Jun 2009 13:46:59 -0400 (EDT)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: oss-security@...ts.openwall.com
cc: "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE request: kernel: sparc64: Fix crash with
 /proc/iomem


======================================================
Name: CVE-2009-1914
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1914
Reference: MLIST:[oss-security] 20090603 CVE request: kernel: sparc64: Fix crash with /proc/iomem
Reference: URL:http://www.openwall.com/lists/oss-security/2009/06/03/3
Reference: CONFIRM:http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=192d7a4667c6d11d1a174ec4cad9a3c5d5f9043c
Reference: CONFIRM:http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.29

The pci_register_iommu_region function in
arch/sparc/kernel/pci_common.c in the Linux kernel before 2.6.29 on
the sparc64 platform allows local users to cause a denial of service
(system crash) by reading the /proc/iomem file, related to
uninitialized pointers and the request_resource function.


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.