Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 7 Mar 2013 13:05:37 +0530 (IST)
From: P J P <ppandit@...hat.com>
To: oss security list <oss-security@...ts.openwall.com>
Subject: CVE-2013-1792 Linux kernel: KEYS: race with concurrent
 install_user_keyrings()

    Hello,

Mateusz Guzik of Red Hat discovered a race condition in 
install_user_keyrings() routine, leading to a NULL pointer dereference. It 
occurs during parallel invocation of the install_user_keyrings & 
lookup_user_key routines, for the same user, if `uid' and `uid-session' 
keyrings are not yet created.

An unprivileged user could use this flaw to crash the system, resulting in 
DoS.

Upstream fix:
-------------
  -> https://lkml.org/lkml/2013/3/6/535

Reference:
----------
  -> https://bugzilla.redhat.com/show_bug.cgi?id=916646

Thank you.
--
Prasad J Pandit / Red Hat Security Response Team
DB7A 84C5 D3F9 7CD1 B5EB  C939 D048 7860 3655 602B

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ