|
Message-Id: <201405010337.s413arU9021604@linus.mitre.org> Date: Wed, 30 Apr 2014 23:36:53 -0400 (EDT) From: cve-assign@...re.org To: ppandit@...hat.com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: CVE request Linux kernel: mm: try_to_unmap_cluster() should lock_page() before mlocking -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > Linux kernel kernel's Memory Management Unit(MMU) is vulnerable to a crash > caused by unlocked memory pages. It could occur during the memory page > migration or while cleaning the swap cache pages. > > An unprivileged user/program could use this flaw to crash the system kernel, > resulting in DoS. > > Upstream fix: > ------------- > -> https://git.kernel.org/linus/57e68e9cd65b4b8eb4045a1e0d0746458502554c > > Introduced in: > -------------- > -> https://git.kernel.org/linus/b291f000393f5a0b679012b39d79fbc85c018233 Use CVE-2014-3122. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJTYcCXAAoJEKllVAevmvms6ZYIAI0DwhXZnaqj8OfEYNQfakn8 ec1O0G3PeswsowxwK9RQsb/lu0qI+FbnxyiQHyfucCINHAElAW+agGEFsfvDIppc JuOZTeAjxHGb9cpuvS5Y/i7+pSKsKAWYGWeHwioIyDUBkVvb0KfKqmgooPtny0o3 jN7Hanvjxer6tghjtxkIPoCvPiOZyvnqkxO6/Ksnb0+cYQXV0iGfnpn86invUh22 CpDlLZtEv922TmcJCF+7mjr9qo8RwLkem1/OHWqxyotI4zGrE2KAeI6XWgbPAoMe tciH1ac+Lg7yU1QxFgmcF3y9wN20sK/UB7DRSNTmPl9/0te3b2ZtcPU8GMRRPPU= =DNdv -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.