oss-sec mailing list archives
CVE Request: use after free bug in "quota" handling in hugetlb code
From: Marcus Meissner <meissner () suse de>
Date: Tue, 24 Apr 2012 16:34:47 +0200
Hi, Reported by Schacher Raindel, quoting his report: There is a use after free bug in the kernel hugetlb code. The bug can allow an authenticated, unprivileged local attacker to crash the system (and possibly gain higher privileges) if huge pages are enabled in the system. A fix has been committed to upstream, commit 90481622d75715bfcb68501280a917dbfe516029 "hugepages: fix use after free bug in "quota" handling" Version-Release number of selected component (if applicable): The bug exists in kernel versions 2.6.24 and above. References: https://bugzilla.novell.com/show_bug.cgi?id=758532 https://bugzilla.redhat.com/show_bug.cgi?id=815065 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commit;h=90481622d75715bfcb68501280a917dbfe516029 Ciao, Marcus
Current thread:
- CVE Request: use after free bug in "quota" handling in hugetlb code Marcus Meissner (Apr 24)
- Re: CVE Request: use after free bug in "quota" handling in hugetlb code Kurt Seifried (Apr 24)