|
Message-ID: <503384E3.8010903@mvista.com> Date: Tue, 21 Aug 2012 05:53:55 -0700 From: akuster <akuster@...sta.com> To: Petr Matousek <pmatouse@...hat.com> CC: oss-security@...ts.openwall.com Subject: Re: CVE Request -- kernel: taskstats: use-after-free in xacct_add_tsk() Petr, If I am not mistaken, this was introduced via 9acc1853519a0473620d424105f9d49ea5b4e62e and only if TASK_XACCT is enabled. is that correct? regards, Armin On 08/20/2012 10:25 AM, Petr Matousek wrote: > An use-after-free flaw has been found in the way taskstat's > TASKSTATS_CMD_ATTR_PID command and exiting tasks with already freed mm > interacted. An unprivileged local user could use this flaw to crash the > system or leak kernel memory. > > Please note that the fix below is from year 2006. > > Upstream fix: > http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=f0ec1aaf54caddd21c259aea8b2ecfbde4ee4fb9 > > References: > http://bugzilla.openvz.org/show_bug.cgi?id=2294 > https://bugzilla.redhat.com/show_bug.cgi?id=849722 > > Thanks,
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.