summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2009-3888
blob: 8b3658b36bb1677dca261310c727e72d96b52ded (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
Candidate: CVE-2009-3888
Description:
 Don't pass NULL pointers to fput() in the error handling paths of the
 NOMMU do_mmap_pgoff() as it can't handle it.
 .
 The following can be used as a test program:
 int main() { static long long a[1024 * 1024 * 20] = { 0 }; return a;}
 .
 Without the patch, the code oopses in atomic_long_dec_and_test() as
 called by fput() after the kernel complains that it can't allocate
 that big a chunk of memory.  With the patch, the kernel just complains 
 about the allocation size and then the program segfaults during execve() 
 as execve() can't complete the allocation of all the new ELF program 
 segments.
References:
 http://www.openwall.com/lists/oss-security/2009/11/09/2
 http://xorl.wordpress.com/2009/11/05/linux-kernel-nommu-fput-null-pointer-dereference/
Notes:
Bugs:
upstream: released (2.6.32-rc6) [89a8640279f8bb78aaf778d1fc5c4a6778f18064]
2.6.31-upstream-stable: released (2.6.31.6)
linux-2.6: released (2.6.31-2) [bugfix/all/stable/2.6.31.6.patch]
2.6.18-etch-security: ignored "unimportant; only affects system w/o an mmu"
2.6.24-etch-security: ignored "unimportant; only affects system w/o an mmu"
2.6.26-lenny-security: ignored "unimportant; only affects system w/o an mmu"

© 2014-2024 Faster IT GmbH | imprint | privacy policy