Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 15 Apr 2010 20:09:50 -0400 (EDT)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: Michael Gilbert <michael.s.gilbert@...il.com>, coley@...re.org
Subject: Re: CVE request: kernel: tty: release_one_tty()
 forgets to put pids

Please use CVE-2010-1162 for this.

Thanks

-- 
    JB


----- "Eugene Teo" <eugene@...hat.com> wrote:

> On 04/15/2010 08:37 AM, Eugene Teo wrote:
> > On 04/15/2010 08:23 AM, Michael Gilbert wrote:
> >> On Wed, 14 Apr 2010 11:20:00 +0800 Eugene Teo wrote:
> >>
> >>> 2) tty: release_one_tty() forgets to put pids
> >>> https://bugzilla.redhat.com/show_bug.cgi?id=582076
> >>>
> http://git.kernel.org/linus/6da8d866d0d39e9509ff826660f6a86a6757c966
> >>> Not sure this issue can be triggered by a non-privileged user.
> >>
> >> this one should get a CVE id i think. looking at only two data
> points
> >> (2.6.26 and 2.6.32), i've found the vulnerable code present in
> both.
> >> if i'm not mistaken, redhat has had supported releases in that
> range.
> >
> > Was discussing this with another colleague, that it seems possible
> to
> > trigger this issue with a non-privileged user. And yes, I agree
> that
> > this should have a CVE name assigned. Thanks.
> 
> pgrp member in struct tty_struct was converted to struct pid in commit
> 
> ab521dc0, so kernels of version v2.6.26-rc1 and above are affected by
> this.
> 
> Eugene

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ