Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <4EEA1D6A.3060905@redhat.com>
Date: Thu, 15 Dec 2011 09:16:42 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Eugene Teo <eugene@...hat.com>,
        "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE request - kernel: perf, powerpc: Handle events
 that raise an exception without overflowing

On 12/15/2011 02:03 AM, Eugene Teo wrote:
> This does not affect the upstream kernel as it is already fixed. This is
> an issue that was introduced when fixing https://bugzilla.redhat.com/740465.
>
> A PMC is 32 bits (ie an int). When we pass it around as an unsigned
> long, we need to cast it before doing the comparison. Using perf on
> power machine with a local, unprivileged user account can cause a denial
> of service.
>
> Upstream commit:
> http://git.kernel.org/linus/0837e3242c73566fc1c0196b4ec61779c25ffc93
>
> Reference:
> https://bugzilla.redhat.com/767914
>
> Thanks, Eugene
Please use CVE-2011-4611 for this issue.

-- 

-Kurt Seifried / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.