Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 18 Aug 2009 14:37:20 -0400 (EDT)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: "Steven M. Christey" <coley@...us.mitre.org>
cc: oss-security@...ts.openwall.com
Subject: Re: CVE request: kernel: flat: fix uninitialized ptr
 with shared libs


On Tue, 18 Aug 2009, Steven M. Christey wrote:

> Use CVE-2009-2845, to be filled in soon.

Actually, that's a duplicate (yikes).  I'll reject that one.

CVE-2009-2768 was already assigned, use it instead.  See below.

- Steve


======================================================
Name: CVE-2009-2768
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2768
Reference: MLIST:[linux-kernel] 20090622 Fix for shared flat binary format in 2.6.30
Reference: URL:http://lkml.org/lkml/2009/6/22/91
Reference: MLIST:[oss-security] 20090813 CVE request: kernel: flat: fix uninitialized ptr with shared libs
Reference: URL:http://www.openwall.com/lists/oss-security/2009/08/13/1
Reference: CONFIRM:http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3440625d78711bee41a84cf29c3d8c579b522666
Reference: CONFIRM:http://thread.gmane.org/gmane.linux.hardware.blackfin.kernel.devel/1905
Reference: CONFIRM:http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.31-rc6
Reference: BID:36037
Reference: URL:http://www.securityfocus.com/bid/36037

The load_flat_shared_library function in fs/binfmt_flat.c in the flat
subsystem in the Linux kernel before 2.6.31-rc6 allows local users to
cause a denial of service (NULL pointer dereference and system crash)
or possibly have unspecified other impact by executing a shared flat
binary, which triggers an access of an "uninitialized cred pointer."


Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.