|
Message-ID: <alpine.LFD.2.10.1405091851300.16696@wniryva.cad.erqung.pbz> Date: Fri, 9 May 2014 19:03:44 +0530 (IST) From: P J P <ppandit@...hat.com> To: oss security list <oss-security@...ts.openwall.com> Subject: CVE request Linux kernel: filter: prevent nla extensions to peek beyond the end of the message Hello, Linux kenrel built with the BPF interpreter support in the networking core is vulnerable to an out of bounds buffer access flaw. It occurs when accessing a netlink attribute from the skb->data buffer. An unprivileged user/program could use this flaw to crash the system kernel resulting in DoS. Upstream fix: ------------- -> https://git.kernel.org/linus/05ab8f2647e4221cbdb3856dd7d32bd5407316b3 Introduced by: -------------- -> https://git.kernel.org/linus/4738c1db1593687713869fa69e733eebc7b0d6d8 -> https://git.kernel.org/linus/d214c7537bbf2f247991fb65b3420b0b3d712c67 Thank you. -- Prasad J Pandit / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.