Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 30 Nov 2010 10:50:11 -0500 (EST)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE request: kernel: pipe_fcntl local DoS

Please use CVE-2010-4256

Thanks.

-- 
    JB


----- "Eugene Teo" <eugene@...hat.com> wrote:

> "Export 'get_pipe_info()' to other users
> 
> And in particular, use it in 'pipe_fcntl()'.
> 
> The other pipe functions do not need to use the 'careful' version,
> since 
> they are only ever called for things that are already known to be
> pipes.
> 
> The normal read/write/ioctl functions are called through the file 
> operations structures, so if a file isn't a pipe, they'd never get 
> called.  But pipe_fcntl() is special, and called directly from the 
> generic fcntl code, and needs to use the same careful function that
> the 
> splice code is using."
> 
> In other words, this is a pipe_fcntl local DoS.
> 
> http://git.kernel.org/linus/71993e62a47dabddf10302807d6aa260455503f4
> http://git.kernel.org/linus/c66fb347946ebdd5b10908866ecc9fa05ee2cf3d
> 
> Introduced in v2.6.35-rc1
> 
> Thanks, Eugene

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.