Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <d6489feaae484961a1302537b90f6bf7@imshyb02.MITRE.ORG>
Date: Sun, 4 Dec 2016 14:45:58 -0500
From: <cve-assign@...re.org>
To: <sploving1@...il.com>
CC: <cve-assign@...re.org>, <oss-security@...ts.openwall.com>,
	<herbert@...dor.apana.org.au>
Subject: Re: CVE Request: -- Linux kernel: double free in netlink_dump

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> A double free vulnerability was found in netlink_dump, which could
> cause a denial of service or possibly other unspecified impact.

> http://lists.openwall.net/netdev/2016/05/15/69
> https://github.com/torvalds/linux/commit/92964c79b357efd980812c4de5c1fd2ec8bb5520

>> netlink: Fix dump skb leak/double free

>> When we free cb->skb after a dump, we do it after releasing the
>> lock.  This means that a new dump could have started in the time
>> being and we'll end up freeing their skb instead of ours.
>> 
>> This patch saves the skb and module before we unlock so we free
>> the right memory.

Use CVE-2016-9806.

- -- 
CVE Assignment Team
M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
[ A PGP key is available for encrypted communications at
  http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCAAGBQJYRHFwAAoJEHb/MwWLVhi2hsAP/3lgM/3+LJHUfJISIWERrGgO
U3X5tyJ7F/HE85fmpMTq1mJxS0pgfswpozEBTwMT/oVOjWNRh0lppMlZegR+yAdr
Whz/xJToSf0I/QRz2AviGtHkGDs3+SeJcVsWQbIh/WGbUpwyy8IdF3WVni+8fNUY
zIhNzdZ8XZCAEl8ZLcvFl7v1SH+t4zfiTMZX9Qalpp6fJ4oNjJlQjY/jrojQ527k
NbM7JGV3UHb+rLLaPBnykTYQ1Kip3KYEZTD26kyI1XbUlTYfjzGQ8Tfx9x+EzDnE
22Fa5aib+I/AkAW0JbPihPBlDEcXGQWMbFTIvPkfqiCjVCO2QWb+WdSJ5F/QBy1F
kPoXsJy++XNjcrtg436KR5jH3wQdUC1zwzmd9SC8QonA7ZQazxDU/vs740o5hray
DQq1Ca/ZqQp5iO8phPhEiVCOGsqwArhaQ0LuR0ZcpaFKXRP/oa5s4xxgUDsq41JZ
4W3K28o5nS3nlMaz/ekolxIhbtJYu7e6xey+YDpno6xYfTbx2mdpl3U1ICB+fSrt
i+H2NKmv4/sEpXQLEh5byJKx0RPCfU+alRfWBeyEU6lcHtmwtvks/V5ttK6OMVRQ
FSZwcRrv2QmEwTqM104umTdUFp+0+3pY4iHwtCLZ5EARp/04UhVtIH3mNScnYn9S
UPX/llj6prAyQ63BQEKg
=Yz/R
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.