Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <1522056838.509851258145256828.JavaMail.root@zmail01.collab.prod.int.phx2.redhat.com>
Date: Fri, 13 Nov 2009 15:47:36 -0500 (EST)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE request - kernel: NOMMU: Dont pass NULL
 pointers to fput() in do_mmap_pgoff()

While this is a bit obscure, let's give it an ID anyway.

CVE-2009-3888

Thanks.

-- 
    JB


----- "Eugene Teo" <eugeneteo@...nel.sg> wrote:

> From upstream patch:
> "Don't pass NULL pointers to fput() in the error handling paths of the
> 
> NOMMU do_mmap_pgoff() as it can't handle it.
> 
> The following can be used as a test program:
> int main() { static long long a[1024 * 1024 * 20] = { 0 }; return a;}
> 
> Without the patch, the code oopses in atomic_long_dec_and_test() as 
> called by fput() after the kernel complains that it can't allocate
> that 
> big a chunk of memory.  With the patch, the kernel just complains
> about 
> the allocation size and then the program segfaults during execve() as
> 
> execve() can't complete the allocation of all the new ELF program
> segments."
> 
> http://git.kernel.org/linus/89a8640279f8bb78aaf778d1fc5c4a6778f18064
> 
> Doesn't affect if CONFIG_MMU=y.
> 
> Thanks, Eugene

-- 
    JB

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.