Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 14 May 2014 15:26:17 +0200
From: Petr Matousek <pmatouse@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request Linux kernel: forbid uaddr == uaddr2
 in futex_wait_requeue_pi() to avoid null dereference

On Wed, May 14, 2014 at 03:19:42PM +0200, Greg KH wrote:
> On Wed, May 14, 2014 at 06:41:14PM +0530, P J P wrote:
> >     Hello,
> > 
> > Linux kernel built with the fast userspace mutexes(CONFIG_FUTEX) support is 
> > vulnerable to a NULL pointer dereference flaw. It could occur when a waiting 
> > task requests wait to be re-queued from non-PI futex to a PI-aware futex via 
> > FUTEX_WAIT_REQUEUE_PI operation.
> > 
> > An unprivileged user/program could use this flaw to crash the system kernel 
> > resulting in DoS.
> > 
> > Upstream fix:
> > -------------
> >    -> https://git.kernel.org/linus/6f7b0a2a5c0fb03be7c25bd1745baa50582348ef
> > 
> > Introduced in:
> > --------------
> >    -> https://git.kernel.org/linus/52400ba946759af28442dee6265c5c0180ac7122
> 
> Why are we asking for CVEs for patches that were written 2 years ago?

It is a security issue and some vendors might not have backported this
patch to their kernels. In this case it's us. For tracking purposes we
asked for CVE assignment.

-- 
Petr Matousek / Red Hat Security Response Team
PGP: 0xC44977CA 8107 AF16 A416 F9AF 18F3  D874 3E78 6F42 C449 77CA

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.