Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 7 Mar 2013 13:05:37 +0530 (IST)
From: P J P <ppandit@...hat.com>
To: oss security list <oss-security@...ts.openwall.com>
Subject: CVE-2013-1792 Linux kernel: KEYS: race with concurrent
 install_user_keyrings()

    Hello,

Mateusz Guzik of Red Hat discovered a race condition in 
install_user_keyrings() routine, leading to a NULL pointer dereference. It 
occurs during parallel invocation of the install_user_keyrings & 
lookup_user_key routines, for the same user, if `uid' and `uid-session' 
keyrings are not yet created.

An unprivileged user could use this flaw to crash the system, resulting in 
DoS.

Upstream fix:
-------------
  -> https://lkml.org/lkml/2013/3/6/535

Reference:
----------
  -> https://bugzilla.redhat.com/show_bug.cgi?id=916646

Thank you.
--
Prasad J Pandit / Red Hat Security Response Team
DB7A 84C5 D3F9 7CD1 B5EB  C939 D048 7860 3655 602B

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.