Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 24 Jun 2016 17:23:43 +1000
From: Michael Ellerman <mpe@...erman.id.au>
To: oss-security@...ts.openwall.com
Subject: CVE Request: Linux: powerpc/tm: Always reclaim in start_thread()
 for exec() class syscalls

Hi,

We've found an issue in the handling of Transactional Memory on powerpc
systems. An unprivileged local user can crash the kernel by starting a
transaction, suspending it, and then calling any of the exec() class system
calls.

More info:
 https://patchwork.ozlabs.org/patch/636776/
 https://patchwork.ozlabs.org/patch/636774/ (test case)

Could you please allocate a CVE for this?

cheers

[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ