|
Message-ID: <20180828125530.GB14413@kroah.com> Date: Tue, 28 Aug 2018 14:55:30 +0200 From: Greg KH <greg@...ah.com> To: oss-security@...ts.openwall.com Subject: Re: CVE-2018-10938: Linux kernel: net: infinite loop in net/ipv4/cipso_ipv4.c:cipso_v4_optptr() allows a remote DoS On Mon, Aug 27, 2018 at 05:25:15AM -0400, Vladis Dronov wrote: > Heololo, > > A flaw was found in the Linux kernel present since v4.0-rc1 and through v4.13-rc4. > A crafted network packet sent remotely by an attacker may force the kernel to enter > an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c leading > to a denial-of-service. > > All the kernels with the cipso_v4_optptr() function which have not backported > the upstream commit 40413955ee26 are vulnerable. > > Thanks to Yves Younan from Cisco for mentioning this. > > References: > > https://bugzilla.redhat.com/show_bug.cgi?id=1622404 > > Upstream Patch introduced the flaw: > > https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04f81f0154e4bf002be6f4d85668ce1257efa4d9 > > Upstream Patch fixed the flaw: > > https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=40413955ee265a5e42f710940ec78f5450d49149 To be more specific here (as I complained about the other CVE report for the kernel a minute ago), this means currently the 3.18.y, 4.4.y, and 4.9.y kernels are vulnerable to this problem. I'll go backport the patch above now to those trees and it will be included in the next releases of these kernel trees later this week. Thanks for posting this here, it is helpful, and I appreciate it. greg k-h
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.