Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 7 Mar 2013 13:05:37 +0530 (IST)
From: P J P <>
To: oss security list <>
Subject: CVE-2013-1792 Linux kernel: KEYS: race with concurrent


Mateusz Guzik of Red Hat discovered a race condition in 
install_user_keyrings() routine, leading to a NULL pointer dereference. It 
occurs during parallel invocation of the install_user_keyrings & 
lookup_user_key routines, for the same user, if `uid' and `uid-session' 
keyrings are not yet created.

An unprivileged user could use this flaw to crash the system, resulting in 

Upstream fix:


Thank you.
Prasad J Pandit / Red Hat Security Response Team
DB7A 84C5 D3F9 7CD1 B5EB  C939 D048 7860 3655 602B

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ