Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 30 Apr 2014 23:36:53 -0400 (EDT)
From: cve-assign@...re.org
To: ppandit@...hat.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request Linux kernel: mm: try_to_unmap_cluster() should lock_page() before mlocking

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> Linux kernel kernel's Memory Management Unit(MMU) is vulnerable to a crash
> caused by unlocked memory pages. It could occur during the memory page
> migration or while cleaning the swap cache pages.
> 
> An unprivileged user/program could use this flaw to crash the system kernel,
> resulting in DoS.
> 
> Upstream fix:
> -------------
>    -> https://git.kernel.org/linus/57e68e9cd65b4b8eb4045a1e0d0746458502554c
> 
> Introduced in:
> --------------
>    -> https://git.kernel.org/linus/b291f000393f5a0b679012b39d79fbc85c018233

Use CVE-2014-3122.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTYcCXAAoJEKllVAevmvms6ZYIAI0DwhXZnaqj8OfEYNQfakn8
ec1O0G3PeswsowxwK9RQsb/lu0qI+FbnxyiQHyfucCINHAElAW+agGEFsfvDIppc
JuOZTeAjxHGb9cpuvS5Y/i7+pSKsKAWYGWeHwioIyDUBkVvb0KfKqmgooPtny0o3
jN7Hanvjxer6tghjtxkIPoCvPiOZyvnqkxO6/Ksnb0+cYQXV0iGfnpn86invUh22
CpDlLZtEv922TmcJCF+7mjr9qo8RwLkem1/OHWqxyotI4zGrE2KAeI6XWgbPAoMe
tciH1ac+Lg7yU1QxFgmcF3y9wN20sK/UB7DRSNTmPl9/0te3b2ZtcPU8GMRRPPU=
=DNdv
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.