|
Message-ID: <4CDA0CC4.4000207@redhat.com> Date: Wed, 10 Nov 2010 11:08:52 +0800 From: Eugene Teo <eugene@...hat.com> To: oss-security@...ts.openwall.com CC: "Steven M. Christey" <coley@...us.mitre.org> Subject: CVE-2010-3086 kernel panic via futex Discovered by Tavis Ormandy, the exception fixup code for the __futex_atomic_op1, __futex_atomic_op2, and futex_atomic_cmpxchg-_inatomic() macros replaced the LOCK prefix with a NOP instruction. This can cause the exceptions to not match the exception table fault fixup. A local, unprivileged user could use this flaw to cause a denial of service. This is assigned with CVE-2010-3086. https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-3086 http://git.kernel.org/linus/9d55b9923a1b7ea8193b8875c57ec940dc2ff027 Thanks, Eugene -- main(i) { putchar(182623909 >> (i-1) * 5&31|!!(i<7)<<6) && main(++i); }
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.