Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20120509192104.GC2769@dhcp-25-225.brq.redhat.com>
Date: Wed, 9 May 2012 21:21:05 +0200
From: Petr Matousek <pmatouse@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE Request -- kernel: futex: clear robust_list
 on execve

On Tue, May 08, 2012 at 04:08:17AM +0400, Solar Designer wrote:
<snip>
> Well, if that process itself is multi-threaded (and
> other threads are not exiting yet), it possibly can be exploited
> (through affecting those other threads).  Is this the only attack
> scenario?

This is the attack scenario that I considered when filing this bug, yes.

> Do we know of any SUID/SGID/fscaps-privileged multi-threaded
> programs?  OK, I suppose that some proprietary ones exist (likely with
> plenty of vulnerabilities in them). ;-)

I haven't looked extensively for those. I can imagine such programs, but
I admit I come from Windows world, so I might be a little bit biased.

Petr

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.