Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 18 Aug 2009 14:37:20 -0400 (EDT)
From: "Steven M. Christey" <>
To: "Steven M. Christey" <>
Subject: Re: CVE request: kernel: flat: fix uninitialized ptr
 with shared libs

On Tue, 18 Aug 2009, Steven M. Christey wrote:

> Use CVE-2009-2845, to be filled in soon.

Actually, that's a duplicate (yikes).  I'll reject that one.

CVE-2009-2768 was already assigned, use it instead.  See below.

- Steve

Name: CVE-2009-2768
Status: Candidate
Reference: MLIST:[linux-kernel] 20090622 Fix for shared flat binary format in 2.6.30
Reference: URL:
Reference: MLIST:[oss-security] 20090813 CVE request: kernel: flat: fix uninitialized ptr with shared libs
Reference: URL:
Reference: CONFIRM:;a=commit;h=3440625d78711bee41a84cf29c3d8c579b522666
Reference: CONFIRM:
Reference: CONFIRM:
Reference: BID:36037
Reference: URL:

The load_flat_shared_library function in fs/binfmt_flat.c in the flat
subsystem in the Linux kernel before 2.6.31-rc6 allows local users to
cause a denial of service (NULL pointer dereference and system crash)
or possibly have unspecified other impact by executing a shared flat
binary, which triggers an access of an "uninitialized cred pointer."

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.