| Summary: | Kernel: forbid uaddr == uaddr2 in futex_wait_requeue_pi() to avoid null dereference (CVE-2012-6647) | ||
|---|---|---|---|
| Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
| Component: | Kernel | Assignee: | Gentoo Kernel Security <security-kernel> |
| Status: | RESOLVED OBSOLETE | ||
| Severity: | normal | CC: | kernel |
| Priority: | Normal | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Package list: | Runtime testing required: | --- | |
|
Description
Agostino Sarubbo
2014-05-27 09:29:00 UTC
CVE-2012-6647 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6647): The futex_wait_requeue_pi function in kernel/futex.c in the Linux kernel before 3.5.1 does not ensure that calls have two different futex addresses, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted FUTEX_WAIT_REQUEUE_PI command. There are no longer any 2.x or <3.5.1 kernels available in the repository with the exception of sys-kernel/xbox-sources which is unsupported by security. |