|
Message-ID: <YFJxUTwEHsaHhO7/@sashalap> Date: Wed, 17 Mar 2021 17:14:57 -0400 From: Sasha Levin <sashal@...nel.org> To: oss-security@...ts.openwall.com Subject: Re: CVE-2020-35519 Linux kernel: x25_bind out-of-bounds read On Thu, Mar 18, 2021 at 01:20:18AM +0530, Rohit Keshri wrote: >Hello Team, > >An out-of-bounds (OOB) memory access flaw was found in x25_bind in >net/x25/af_x25.c in the Linux kernel. A bounds check failure allows a local >attacker with a user account on the system to gain access to out-of-bounds >memory, leading to a system crash or a leak of internal kernel information. >The highest threat from this vulnerability is to confidentiality, >integrity, as well as system availability. > >'CVE-2020-35519' was assigned by Red Hat. This mail doesn't even mention where/how this is fixed. Is this 6ee50c8e262a ("net/x25: prevent a couple of overflows")? If so, it's already fixed in all stable kernels. How can the issue cause a leak btw? -- Thanks, Sasha
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.