Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 496170 - Kernel: shm: use-after-free DoS via IPC_RMID call (CVE-2013-7026)
Summary: Kernel: shm: use-after-free DoS via IPC_RMID call (CVE-2013-7026)
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Kernel Security
URL:
Whiteboard: [ <3.12.2 ]
Keywords:
Depends on:
Blocks:
 
Reported: 2013-12-27 14:57 UTC by GLSAMaker/CVETool Bot
Modified: 2022-03-25 19:18 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description GLSAMaker/CVETool Bot gentoo-dev 2013-12-27 14:57:25 UTC
CVE-2013-7026 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7026):
  Multiple race conditions in ipc/shm.c in the Linux kernel before 3.12.2
  allow local users to cause a denial of service (use-after-free and system
  crash) or possibly have unspecified other impact via a crafted application
  that uses shmctl IPC_RMID operations in conjunction with other shm system
  calls.
Comment 1 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-03-25 19:18:33 UTC
In 3.13 onward: https://github.com/torvalds/linux/commit/a399b29dfbaaaf91162b2dc5a5875dd51bbfa2a1