Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20130220004108.GT14748@dhcp-25-225.brq.redhat.com>
Date: Wed, 20 Feb 2013 01:41:09 +0100
From: Petr Matousek <pmatouse@...hat.com>
To: oss-security@...ts.openwall.com
Cc: Kurt Seifried <kseifrie@...hat.com>
Subject: CVE request -- Linux kernel: net: CIPSO_V4_TAG_LOCAL tag NULL
 pointer dereference

The skb argument to cipso_v4_validate() is NULL when called via the
setsockopt() syscall. An local user able to set CIPSO IP options on the
socket could use this flaw to crash the system.

Upstream fix:
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=89d7ae34cdda4195809a5a987f697a517a2a3177

References:
https://bugzilla.redhat.com/show_bug.cgi?id=912900

Thanks,
-- 
Petr Matousek / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.