|
Message-ID: <512BB31C.50003@gmail.com> Date: Mon, 25 Feb 2013 13:53:16 -0500 From: Dan Rosenberg <dan.j.rosenberg@...il.com> To: oss-security@...ts.openwall.com Subject: Re: CVE Request: kernel - sock_diag: Fix out-of-bounds access to sock_diag_handlers[] On 02/25/2013 01:45 PM, Mathias Krause wrote: > Did you even try to run the exploit on a v3.2 kernel? Or even more > simple, looked at the code of a v3.2 kernel? There is no sock_diag > anywhere in the kernel; there is only inet_diag. And inet_diag hadn't > and still does not have the out-of-bounds access issue. So no, this > bug is non-existent on a v3.2 kernel. > > Thanks, > Mathias > The bug was introduced with this commit: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commit;h=d366477a52f1df29fa066ffb18e4e6101ee2ad04 This commit took place during kernel version 3.2.0-rc4, so yes, it does seem to affect 3.2 kernels. Regards, Dan
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.