Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID:
 <AM9P192MB13169D3C23104FC22ECCFD3AD74B2@AM9P192MB1316.EURP192.PROD.OUTLOOK.COM>
Date: Tue, 29 Oct 2024 13:03:43 +0000
From: Joel GUITTET <jguittet.opensource@...ekio.com>
To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com>
Subject: CVE-2024-36905: Linux kernel: Divide-by-zero on shutdown of TCP_SYN_RECV sockets

Hello,

We would like to ask your advice about the CVE-2024-36905 (tcp shutdown vulnerability).
NIST indicates a network vector while AWS and Red Hat indicates local attack vector.
Our cybersecurity team has difficulties to justify that a local vector is appropriate here.
Can you help us to understand this specific point for this CVE ? The hypothesis we have is that a TCP socket need to be open/closed quickly, and maybe it's not possible remotely ? 

Thanks for the feedback!

Best Regards
J. Guittet

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.