Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 7 Mar 2013 13:05:37 +0530 (IST)
From: P J P <>
To: oss security list <>
Subject: CVE-2013-1792 Linux kernel: KEYS: race with concurrent


Mateusz Guzik of Red Hat discovered a race condition in 
install_user_keyrings() routine, leading to a NULL pointer dereference. It 
occurs during parallel invocation of the install_user_keyrings & 
lookup_user_key routines, for the same user, if `uid' and `uid-session' 
keyrings are not yet created.

An unprivileged user could use this flaw to crash the system, resulting in 

Upstream fix:


Thank you.
Prasad J Pandit / Red Hat Security Response Team
DB7A 84C5 D3F9 7CD1 B5EB  C939 D048 7860 3655 602B

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.