Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 24 Apr 2012 16:34:47 +0200
From: Marcus Meissner <meissner@...e.de>
To: OSS Security List <oss-security@...ts.openwall.com>
Subject: CVE Request: use after free bug in "quota" handling in hugetlb code

Hi,

Reported by Schacher Raindel, quoting his report:

There is a use after free bug in the kernel hugetlb code. The bug can allow an
authenticated, unprivileged local attacker to crash the system (and possibly
gain higher privileges) if huge pages are enabled in the system.

A fix has been committed to upstream, commit
90481622d75715bfcb68501280a917dbfe516029 "hugepages: fix use after free bug in
"quota" handling"

Version-Release number of selected component (if applicable):
The bug exists in kernel versions 2.6.24 and above.

References:
	https://bugzilla.novell.com/show_bug.cgi?id=758532
	https://bugzilla.redhat.com/show_bug.cgi?id=815065
	http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commit;h=90481622d75715bfcb68501280a917dbfe516029

Ciao, Marcus

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.