oss-sec mailing list archives

CVE request: kernel: splice: fix bad unlock_page() in error case


From: Eugene Teo <eteo () redhat com>
Date: Tue, 16 Sep 2008 17:01:03 +0800

Hi Steve,

This bug requires a CVE name. Please allocate one.

This upstream commit addressed a user triggerable DoS:
6a860c979b35469e4d77da781a96bdb2ca05ae64

Summary:
[PATCH] splice: fix bad unlock_page() in error case

If add_to_page_cache_lru() fails, the page will not be locked. But
splice jumps to an error path that does a page release and unlock,
causing a BUG() in unlock_page().

Reproducer:
http://lkml.org/lkml/2007/7/30/448
(different issue, but same reproducer)

References:
http://lkml.org/lkml/2007/7/20/168
https://bugzilla.redhat.com/show_bug.cgi?id=462434

Thanks, Eugene
-- 
Eugene Teo / Red Hat Security Response Team


Current thread: