|
Message-ID: <CAG48ez3JJ_+smFw9H8Fv2t2Rv0qNKrgBEp1hsfYL0BF16VWnNg@mail.gmail.com> Date: Tue, 5 Mar 2019 22:02:49 +0100 From: Jann Horn <jannhorn@...glemail.com> To: oss-security@...ts.openwall.com Subject: Linux kernel: OOB R/W in SNMP NAT module (CVE-2019-9162); virtual address 0 mappable (CVE-2019-9213) Two Linux kernel bugs: out-of-bounds read and write in SNMP NAT module introduced in commit cc2d58634e0f ("netfilter: nf_nat_snmp_basic: use asn1 decoder library", first in 4.16) https://bugs.chromium.org/p/project-zero/issues/detail?id=1776 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net?id=c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.103 https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.25 [this one's been public for a while, I didn't get around to sending a mail to oss-security about it] virtual address 0 is mappable via privileged write() to /proc/*/mem https://bugs.chromium.org/p/project-zero/issues/detail?id=1792 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0a1d52994d440e21def1c2174932410b4f2a98a1 https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.14 https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.27 https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.105 https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.162
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.