Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 14 May 2014 15:19:42 +0200
From: Greg KH <>
Subject: Re: CVE request Linux kernel: forbid uaddr == uaddr2
 in futex_wait_requeue_pi() to avoid null dereference

On Wed, May 14, 2014 at 06:41:14PM +0530, P J P wrote:
>     Hello,
> Linux kernel built with the fast userspace mutexes(CONFIG_FUTEX) support is 
> vulnerable to a NULL pointer dereference flaw. It could occur when a waiting 
> task requests wait to be re-queued from non-PI futex to a PI-aware futex via 
> An unprivileged user/program could use this flaw to crash the system kernel 
> resulting in DoS.
> Upstream fix:
> -------------
>    ->
> Introduced in:
> --------------
>    ->

Why are we asking for CVEs for patches that were written 2 years ago?

For those that do not know, the fix was in released kernel version 3.6.0

greg k-h

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ