Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 21 Aug 2012 05:53:55 -0700
From: akuster <>
To: Petr Matousek <>
Subject: Re: CVE Request -- kernel: taskstats: use-after-free
 in xacct_add_tsk()


If I am not mistaken, this was introduced via
9acc1853519a0473620d424105f9d49ea5b4e62e and only if TASK_XACCT is enabled.

is that correct?


On 08/20/2012 10:25 AM, Petr Matousek wrote:
> An use-after-free flaw has been found in the way taskstat's
> TASKSTATS_CMD_ATTR_PID command and exiting tasks with already freed mm
> interacted. An unprivileged local user could use this flaw to crash the
> system or leak kernel memory.
> Please note that the fix below is from year 2006.
> Upstream fix:
> References:
> Thanks,

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.