Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 20 Aug 2012 19:25:11 +0200
From: Petr Matousek <pmatouse@...hat.com>
To: oss-security@...ts.openwall.com
Subject: CVE Request -- kernel: taskstats: use-after-free in xacct_add_tsk()

An use-after-free flaw has been found in the way taskstat's
TASKSTATS_CMD_ATTR_PID command and exiting tasks with already freed mm
interacted. An unprivileged local user could use this flaw to crash the
system or leak kernel memory.

Please note that the fix below is from year 2006.

Upstream fix:
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=f0ec1aaf54caddd21c259aea8b2ecfbde4ee4fb9

References:
http://bugzilla.openvz.org/show_bug.cgi?id=2294
https://bugzilla.redhat.com/show_bug.cgi?id=849722

Thanks,
-- 
Petr Matousek / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.