ALT-PU-2014-1193-1
Package kernel-image-un-def updated to version 3.4.80-alt0.M60P.1 for branch p6 in task 114194.
Closed vulnerabilities
Published: 2014-05-27
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2012-6647
The futex_wait_requeue_pi function in kernel/futex.c in the Linux kernel before 3.5.1 does not ensure that calls have two different futex addresses, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted FUTEX_WAIT_REQUEUE_PI command.
Severity: MEDIUM (4.9)
References:
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6f7b0a2a5c0fb03be7c25bd1745baa50582348ef
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6f7b0a2a5c0fb03be7c25bd1745baa50582348ef
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.5.1
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.5.1
- [oss-security] 20140514 Re: CVE request Linux kernel: forbid uaddr == uaddr2 in futex_wait_requeue_pi() to avoid null dereference
- [oss-security] 20140514 Re: CVE request Linux kernel: forbid uaddr == uaddr2 in futex_wait_requeue_pi() to avoid null dereference
- https://bugzilla.redhat.com/show_bug.cgi?id=1097746
- https://bugzilla.redhat.com/show_bug.cgi?id=1097746
- https://github.com/torvalds/linux/commit/6f7b0a2a5c0fb03be7c25bd1745baa50582348ef
- https://github.com/torvalds/linux/commit/6f7b0a2a5c0fb03be7c25bd1745baa50582348ef