Date: Tue, 18 Aug 2009 14:37:20 -0400 (EDT) From: "Steven M. Christey" <coley@...us.mitre.org> To: "Steven M. Christey" <coley@...us.mitre.org> cc: oss-security@...ts.openwall.com Subject: Re: CVE request: kernel: flat: fix uninitialized ptr with shared libs On Tue, 18 Aug 2009, Steven M. Christey wrote: > Use CVE-2009-2845, to be filled in soon. Actually, that's a duplicate (yikes). I'll reject that one. CVE-2009-2768 was already assigned, use it instead. See below. - Steve ====================================================== Name: CVE-2009-2768 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2768 Reference: MLIST:[linux-kernel] 20090622 Fix for shared flat binary format in 2.6.30 Reference: URL:http://lkml.org/lkml/2009/6/22/91 Reference: MLIST:[oss-security] 20090813 CVE request: kernel: flat: fix uninitialized ptr with shared libs Reference: URL:http://www.openwall.com/lists/oss-security/2009/08/13/1 Reference: CONFIRM:http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3440625d78711bee41a84cf29c3d8c579b522666 Reference: CONFIRM:http://thread.gmane.org/gmane.linux.hardware.blackfin.kernel.devel/1905 Reference: CONFIRM:http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.31-rc6 Reference: BID:36037 Reference: URL:http://www.securityfocus.com/bid/36037 The load_flat_shared_library function in fs/binfmt_flat.c in the flat subsystem in the Linux kernel before 2.6.31-rc6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by executing a shared flat binary, which triggers an access of an "uninitialized cred pointer."
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.