Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20120510002739.GA23554@openwall.com>
Date: Thu, 10 May 2012 04:27:39 +0400
From: Solar Designer <solar@...nwall.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE Request -- kernel: futex: clear robust_list on execve

Petr -

On Wed, May 09, 2012 at 09:30:55PM +0200, Petr Matousek wrote:
> In this case single-threaded (privileged) Xorg was run with a stale
> robust list pointer that accidentally fell into MMIO area

Wow.  Thank you for your helpful answers, and for including that info on
the RH Bugzilla entry.

So this gives us another attack scenario: not only on multi-threaded
programs, but also on programs that have MMIO or e.g. disk files mmap'ed
and writable.

Alexander

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.