Date: Tue, 24 Apr 2012 16:34:47 +0200 From: Marcus Meissner <meissner@...e.de> To: OSS Security List <oss-security@...ts.openwall.com> Subject: CVE Request: use after free bug in "quota" handling in hugetlb code Hi, Reported by Schacher Raindel, quoting his report: There is a use after free bug in the kernel hugetlb code. The bug can allow an authenticated, unprivileged local attacker to crash the system (and possibly gain higher privileges) if huge pages are enabled in the system. A fix has been committed to upstream, commit 90481622d75715bfcb68501280a917dbfe516029 "hugepages: fix use after free bug in "quota" handling" Version-Release number of selected component (if applicable): The bug exists in kernel versions 2.6.24 and above. References: https://bugzilla.novell.com/show_bug.cgi?id=758532 https://bugzilla.redhat.com/show_bug.cgi?id=815065 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commit;h=90481622d75715bfcb68501280a917dbfe516029 Ciao, Marcus
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.