William Immendorf wrote:
> I've recently stumbled upon an security flaw in Linux. It affects
> Linux < 2.6.32-rc6. The problem is that when using the
> pipe_read_open(), pipe_write_open() or pipe_rdwr_open() functions
> while releasing a mutex (mutual exclusion) too early, in certain
> conditions, this causes a race condition, which allows the bad guy to
> have root access, and you know what happens next.
> 
> There are two fixes: One, backport a patch that fixes this issues to
> 2.6.31.6 and 2.6.30.2 (the former is the LFS Dev version, the latter,
> the 6.5 version, and for the 6.5 version, add a errata link to the
> patch..) from here:
> http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=ad3960243e55320d74195fb85c975e0a8cc4466c.
> 
> The other fix is to set mmap_min_addr to a value higher than 0, such
> as 65535, but that also causes wine, dosbox, and qemu to malfunction,
> so that's why I perfer the backported patch. Please, please, patch the
> kernel to fix this issue, and please stop LFS from being exploited.

Thanks for the heads up.  I don't think this is an emergency though. 
New kernels are released pretty regularly.  I think that 2.6.31.7 and/or 
2.6.32.0 will be released in the next day or two.  At that point we can 
update -dev.   Although there is a note in LFS to use the latest 
2.6.31.x kernel, we'll also put in a note into the errata about the 
vulnerability.

   -- Bruce


-- 
http://linuxfromscratch.org/mailman/listinfo/lfs-dev
FAQ: http://www.linuxfromscratch.org/faq/
Unsubscribe: See the above information page

Reply via email to