|
Message-ID: <4CF489B1.2010800@redhat.com> Date: Tue, 30 Nov 2010 13:20:49 +0800 From: Eugene Teo <eugene@...hat.com> To: oss-security@...ts.openwall.com CC: "Steven M. Christey" <coley@...us.mitre.org> Subject: CVE request: kernel: pipe_fcntl local DoS "Export 'get_pipe_info()' to other users And in particular, use it in 'pipe_fcntl()'. The other pipe functions do not need to use the 'careful' version, since they are only ever called for things that are already known to be pipes. The normal read/write/ioctl functions are called through the file operations structures, so if a file isn't a pipe, they'd never get called. But pipe_fcntl() is special, and called directly from the generic fcntl code, and needs to use the same careful function that the splice code is using." In other words, this is a pipe_fcntl local DoS. http://git.kernel.org/linus/71993e62a47dabddf10302807d6aa260455503f4 http://git.kernel.org/linus/c66fb347946ebdd5b10908866ecc9fa05ee2cf3d Introduced in v2.6.35-rc1 Thanks, Eugene
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.