Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <4AF79D01.3090305@kernel.sg>
Date: Mon, 09 Nov 2009 12:39:29 +0800
From: Eugene Teo <eugeneteo@...nel.sg>
To: oss-security@...ts.openwall.com
CC: "Steven M. Christey" <coley@...us.mitre.org>
Subject: CVE request - kernel: NOMMU: Dont pass NULL pointers to fput() in
 do_mmap_pgoff()

 From upstream patch:
"Don't pass NULL pointers to fput() in the error handling paths of the 
NOMMU do_mmap_pgoff() as it can't handle it.

The following can be used as a test program:
int main() { static long long a[1024 * 1024 * 20] = { 0 }; return a;}

Without the patch, the code oopses in atomic_long_dec_and_test() as 
called by fput() after the kernel complains that it can't allocate that 
big a chunk of memory.  With the patch, the kernel just complains about 
the allocation size and then the program segfaults during execve() as 
execve() can't complete the allocation of all the new ELF program segments."

http://git.kernel.org/linus/89a8640279f8bb78aaf778d1fc5c4a6778f18064

Doesn't affect if CONFIG_MMU=y.

Thanks, Eugene

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.