Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <51D31D28.5000103@redhat.com>
Date: Tue, 02 Jul 2013 12:34:16 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Marcus Meissner <meissner@...e.de>
Subject: Re: CVE Request: kernel: ipv6: using ipv4 vs ipv6
 structure during routing lookup in sendmsg

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 07/02/2013 03:14 AM, Marcus Meissner wrote:
> Hi,
> 
> Also fresh in the mainline kernel and spotted by trinity:
> 
> commit a963a37d384d71ad43b3e9e79d68d42fbe0901f3 Author: Eric
> Dumazet <edumazet@...gle.com> Date:   Wed Jun 26 04:15:07 2013
> -0700
> 
> ipv6: ip6_sk_dst_check() must not assume ipv6 dst
> 
> It's possible to use AF_INET6 sockets and to connect to an IPv4 
> destination. After this, socket dst cache is a pointer to a
> rtable, not rt6_info.
> 
> ip6_sk_dst_check() should check the socket dst cache is IPv6, or
> else various corruptions/crashes can happen.
> 
> Dave Jones can reproduce immediate crash with trinity -q -l off -n
> -c sendmsg -c connect
> 
> With help from Hannes Frederic Sowa
> 
> Reported-by: Dave Jones <davej@...hat.com> Reported-by: Hannes
> Frederic Sowa <hannes@...essinduktion.org> Signed-off-by: Eric
> Dumazet <edumazet@...gle.com> Acked-by: Hannes Frederic Sowa
> <hannes@...essinduktion.org> Signed-off-by: David S. Miller
> <davem@...emloft.net>
> 
> 
> Can be triggered by non-root users according to Eric, so needs a
> CVE.
> 
> Ciao, Marcus

Confirmed, locks up good. Please use CVE-2013-2232 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=6I6r
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.