summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2009-3547
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2009-11-16 23:42:50 +0000
committerMoritz Muehlenhoff <jmm@debian.org>2009-11-16 23:42:50 +0000
commit7bf285031f6a13c6ea46b3f2776ffdb80b2493ba (patch)
tree5bbf8a425252ffbe6bed2c67fc24960360caaafe /retired/CVE-2009-3547
parent059f9452d521f0b11c49cf4c8aa0366d69a5a46c (diff)
retire two more issues
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1605 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2009-3547')
-rw-r--r--retired/CVE-2009-354722
1 files changed, 22 insertions, 0 deletions
diff --git a/retired/CVE-2009-3547 b/retired/CVE-2009-3547
new file mode 100644
index 00000000..7903c85c
--- /dev/null
+++ b/retired/CVE-2009-3547
@@ -0,0 +1,22 @@
+Candidate: CVE-2009-3547
+Description:
+ a NULL pointer dereference flaw was found in each of the following
+ functions in the Linux kernel: pipe_read_open(), pipe_write_open(), and
+ pipe_rdwr_open(). When the mutex lock is not held, the i_pipe pointer could
+ be released by other processes before it is used to update the pipe's reader
+ and writer counters. This could lead to a local denial of service or
+ privilege escalation.
+References:
+ http://www.openwall.com/lists/oss-security/2009/11/03/1
+Notes:
+ Brad Spengler *claims* to have already developed a working exploit. Since
+ his previous work has been effective, it is probably true. Hence, this
+ should be treated with high urgency.
+ - May be not be exploitable on debian due to mmap_min_addr protections?
+jmm> ad3960243e55320d74195fb85c975e0a8cc4466c
+Bugs:
+upstream: released (2.6.32-rc6) [ad396024]
+linux-2.6: released (2.6.31-2)
+2.6.18-etch-security: released (2.6.18.dfsg.1-26etch1) [bugfix/all/fs-pipe-null-pointer-dereference.patch]
+2.6.24-etch-security: released (2.6.24-6~etchnhalf.9etch1) [bugfix/all/fs-pipe-null-pointer-dereference.patch]
+2.6.26-lenny-security: released (2.6.26-19lenny2) [bugfix/all/fs-pipe-null-pointer-dereference.patch]

© 2014-2024 Faster IT GmbH | imprint | privacy policy