[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] Re: CVE-2018-1000200 (Linux): Bad memory access on oom kill of large mlocked process
From:       David Rientjes <rientjes () google ! com>
Date:       2018-05-14 21:35:14
Message-ID: alpine.DEB.2.21.1805141433390.31401 () chino ! kir ! corp ! google ! com
[Download RAW message or body]

On Tue, 24 Apr 2018, David Rientjes wrote:

> Hi all,
> 
> Out of memory (oom) killing a process that has large spans of mlocked 
> memory can result in a bad memory access or a NULL pointer dereference due 
> to concurrent memory unmapping by the oom reaper kernel thread.
> 
> This affects Linux 4.14, 4.15, and 4.16.
> 

The fix for this has been merged into 4.17-rc5 as commit 27ae357fa82b 
("mm, oom: fix concurrent munlock and oom reaper unmap, v3"), see 
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=27ae357fa82be5ab73b2ef8d39dcb8ca2563483a


Furthermore, it has been staged for inclusion in both the 4.14 and 4.16 
stable kernels.


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic