Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <4B050A45.6070804@kernel.sg>
Date: Thu, 19 Nov 2009 17:05:09 +0800
From: Eugene Teo <eugeneteo@...nel.sg>
To: oss-security@...ts.openwall.com
CC: "Steven M. Christey" <coley@...us.mitre.org>
Subject: CVE request: kernel: fuse: prevent fuse_put_request on invalid pointer

"fuse_direct_io() has a loop where requests are allocated in each 
iteration. if allocation fails, the loop is broken out and follows into 
an unconditional fuse_put_request() on that invalid pointer."

Upstream commit:
http://git.kernel.org/linus/f60311d5f7670d9539b424e4ed8b5c0872fc9e83

This can be triggered when the system is low on memory, and when the 
fuse_request_alloc() function called from fuse_get_req() fails. The 
fuse_put_request() function will then dereference the invalid pointer 
returned, resulting in a kernel oops.

This was introduced in 413ef8cb (v2.6.14-rc1) and fixed in v2.6.32-rc7.

https://bugzilla.redhat.com/538734

Thanks, Eugene

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.