Bug 509629 - kernel: fd leak if pipe() is called with an invalid address [mrg-1]
Summary: kernel: fd leak if pipe() is called with an invalid address [mrg-1]
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise MRG
Classification: Red Hat
Component: realtime-kernel
Version: 1.1
Hardware: All
OS: Linux
high
high
Target Milestone: 1.1.5
: ---
Assignee: Red Hat Real Time Maintenance
QA Contact: David Sommerseth
URL:
Whiteboard:
Depends On: 509625
Blocks:
TreeView+ depends on / blocked
 
Reported: 2009-07-04 08:11 UTC by Eugene Teo (Security Response)
Modified: 2016-05-22 23:28 UTC (History)
6 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of: 509625
Environment:
Last Closed: 2009-07-14 19:11:46 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2009:1157 0 normal SHIPPED_LIVE Important: kernel-rt security and bug fix update 2009-07-14 19:11:05 UTC

Description Eugene Teo (Security Response) 2009-07-04 08:11:14 UTC
+++ This bug was initially created as a clone of Bug #509625 +++

Description of problem:
fd leak if pipe() is called with an invalid address.

Though -EFAULT is returned, the file descriptors opened by pipe() call are left open.

Reference:
http://patchwork.kernel.org/patch/33640/

Comment 2 Eugene Teo (Security Response) 2009-07-04 08:20:56 UTC
http://www.chineselinuxuniversity.net/patches/43722.shtml

Comment 3 Luis Claudio R. Goncalves 2009-07-06 15:12:13 UTC
Applied to kernel -124

Comment 7 errata-xmlrpc 2009-07-14 19:11:46 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2009-1157.html


Note You need to log in before you can comment on or make changes to this bug.