Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1097746 - (CVE-2012-6647) CVE-2012-6647 Kernel: futex: forbid uaddr == uaddr2 in futex_wait_requeue_pi()
CVE-2012-6647 Kernel: futex: forbid uaddr == uaddr2 in futex_wait_requeue_pi()
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20120720,repor...
: Security
Depends On: 1097759 1097760
Blocks: 1097133
  Show dependency treegraph
 
Reported: 2014-05-14 08:48 EDT by Prasad J Pandit
Modified: 2015-02-16 10:50 EST (History)
33 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
A NULL pointer dereference flaw was found in the way the futex_wait_requeue_pi() function of the Linux kernel's futex subsystem handled the requeuing of certain Priority Inheritance (PI) futexes. A local, unprivileged user could use this flaw to crash the system.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2014-07-29 12:16:03 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2014:0981 normal SHIPPED_LIVE Important: kernel security, bug fix, and enhancement update 2014-07-29 15:51:12 EDT

  None (edit)
Description Prasad J Pandit 2014-05-14 08:48:01 EDT
Linux kernel built with the fast userspace mutexes(CONFIG_FUTEX) support is
vulnerable to a NULL pointer dereference flaw. It could occur when a waiting
task requests wait to be re-queued from non-PI futex to a PI-aware futex via
FUTEX_WAIT_REQUEUE_PI operation.

An unprivileged user/program could use this flaw to crash the system kernel
resulting in DoS.

Upstream fix:
-------------
  -> https://git.kernel.org/linus/6f7b0a2a5c0fb03be7c25bd1745baa50582348ef

Introduced in:
--------------
  -> https://git.kernel.org/linus/52400ba946759af28442dee6265c5c0180ac7122
Comment 1 Prasad J Pandit 2014-05-14 09:16:53 EDT
Statement:

This issue does not affect the versions of the kernel package as shipped with
Red Hat Enterprise Linux 5 and 7, and Red Hat Enterprise MRG 2.
Comment 4 Martin Prpič 2014-07-29 07:20:57 EDT
IssueDescription:

A NULL pointer dereference flaw was found in the way the futex_wait_requeue_pi() function of the Linux kernel's futex subsystem handled the requeuing of certain Priority Inheritance (PI) futexes. A local, unprivileged user could use this flaw to crash the system.
Comment 5 errata-xmlrpc 2014-07-29 11:53:38 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2014:0981 https://rhn.redhat.com/errata/RHSA-2014-0981.html

Note You need to log in before you can comment on or make changes to this bug.