|
Message-ID: <51EEDF1B.7010704@redhat.com> Date: Tue, 23 Jul 2013 13:52:59 -0600 From: Kurt Seifried <kseifried@...hat.com> To: oss-security@...ts.openwall.com CC: P J P <ppandit@...hat.com> Subject: Re: CVE request: Linux kernel: panic while appending data to a corked IPv6 socket in ip6_append_data_mtu -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 07/23/2013 01:36 PM, P J P wrote: > Hi, > > Linux kernel built with the IPv6 networking support is vulnerable > to a crash while appending data to an IPv6 socket with UDP_CORKED > option set. UDP_CORK enables accumulating data and sending it as > single datagram. > > An unprivileged user/program could use this flaw to crash the > kernel, resulting in local DoS. > > Upstream fix: ------------- -> > https://git.kernel.org/linus/75a493e60ac4bbe2e977e7129d6d8cbb0dd236be > > Reference: ---------- -> > https://bugzilla.redhat.com/show_bug.cgi?id=987633 > > Acknowledgements: ----------------- > > Red Hat would like to thank Hannes Frederic Sowa for reporting this > issue. > > Thank you. -- Prasad J Pandit / Red Hat Security Response Team DB7A > 84C5 D3F9 7CD1 B5EB C939 D048 7860 3655 602B Please use CVE-2013-4163 for this issue. - -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux) iQIcBAEBAgAGBQJR7t8bAAoJEBYNRVNeJnmTFv4QAJOWescZj0nhdpKxBAKxmpup /23aw/8sY4wZ/L7lOakx5PaF3Ia15ZAknTjNqzio0UvjyDONZFOOZXdEde3IuS3J WJ5OiyisccJrGEuKTEa/rhwr1zAS/R/7QwSMZIDMHpgQGustSFpQKCH2TCCdiPFu Fm6hINLG0GBotCzmOOd10bJBFDMMHzCLc2lbHM8/cJXcbXR60D8G1WO6jWhD7hg8 HYF9/64A44wmJG+13Pq4GUj4yCAFyVUrUMdRIjDNmAa4Y0x52/P83vY+Xer5nwt0 ZivlPqD0/NqqlfIf+bPAU6t0v/7ZIPBxVbdh7rJTSF5PY/zVnLGzFi9BiQxnufkc F874zW0hPXZ0QwHr2MFNdKHizgibepOi5NAScPULXvnkmUNSElqiWK98uiH/WX1z bANKu4tOh7+FnWBugi7gPBwz5j7+8uk4XVj+2kaKnHO2WlJBuxxSjGvAZuPcaowb C3rM3n9eL8Ye2O/bSV0eYV0583CB3x/xXy8WHwUt6yMqjsUZP1lTnXbRYAdt10U4 v+hstzsX9MhZV9eb17/ilBIh/8y/GjJOCijZ/C7WkeDYrgF6djHpbVT/ClRVhaLg lcED9/fp4JmgnRdRLuaRd++bBYA1NuIuhzXrish8ILRa4cIuXongwgx5fQadACaA sWbHTXj762d+jjSG75GP =6ulD -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.