Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 02 Oct 2008 09:22:54 +0800
From: Eugene Teo <eteo@...hat.com>
To: oss-security@...ts.openwall.com
Subject: CVE-2008-3832 kernel: null pointer dereference in utrace_control

Michael Simms reported that it is possible for an unprivileged user to
crash the machine by running gdb on a running process with pid 1.

This affects the version of utrace as shipped with Fedora 8 and 9. This
is addressed in kernel-2.6.26.5-28 for Fedora 8, and kernel-2.6.26.5-45
for Fedora 9. This issue is specific to Fedora, and does not affect
upstream or any of the Red Hat Enterprise Linux kernels.

References:
http://kerneloops.org/oops.php?number=56705
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-3832

Thanks, Eugene
-- 
Eugene Teo / Red Hat Security Response Team

View attachment "patch" of type "text/plain" (608 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.