Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 30 Oct 2013 10:03:20 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com, vdavydov@...allels.com,
        khorenko@...allels.com, vvs@...allels.com
Subject: Re: CVE Request -- Linux kernel: ipc: ipc_rcu_putref
 refcount races

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 10/30/2013 08:52 AM, Petr Matousek wrote:
> A flaw was found in the way ipc_rcu_putref() function handled
> reference counter decrementing. Without external synchronization
> reference counter might not be adjusted properly, as presented with
> the freeque() vs do_msgsnd() race, leading to memory leaks.
> 
> An unprivileged local user could use this flaw to cause OOM
> conditions, potentially crashing the system.
> 
> References: https://bugzilla.redhat.com/show_bug.cgi?id=1024854 
> https://wiki.openvz.org/Download/kernel/rhel6-testing/042stab084.3
> 
> Upstream patch: 
> http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6062a8
>
> 
(making the refcounter atomic hunks)
> 
> Acknowledgements:
> 
> Red Hat would like to thank Vladimir Davydov (Parallels) for
> reporting this issue.
> 
> Thanks,

Please use CVE-2013-4483 for this issue.


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.15 (GNU/Linux)
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=5AIf
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.