oss-sec mailing list archives
Re: CVE request: Kernel 2.6.32+ IP_RETOPTS Buffer Poisoning DoS
From: Kurt Seifried <kseifried () redhat com>
Date: Sun, 30 Jun 2013 17:01:15 -0600
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 06/30/2013 01:33 AM, Steven Ciaburri wrote:
There is a local DOS exploit in centos 6, openvz 6, cloudlinux 6 and others. https://www.rack911.com/poc/hemlock.c
Please use CVE-2013-2224 for this issue. - -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux) iQIcBAEBAgAGBQJR0Li7AAoJEBYNRVNeJnmTVI0QAIfJnky7/AHyXvx7KXUAG7Fh GR+fJ54yJtaY7AOh0DKt9oNwHOhPrWD6agXWtyOwaI9V6CgrIpDY3baiwN9rFAG2 e6/XVfS3bfzf7fADlz8hFGqjtL5hGtHPVScoQY8TYiX/JJ9ibIYM1YmvA4YQhYJL qv+p/jDjb1UufHm7pHFpz34rbUvnHmmaKKYR2xIubyaNHBY4pYrXYbtJQcOYswy+ iP3w4S2YY17I79E3Ud6YzLNbRAhsrv/ALWfSFQq0IMDYGpLSp7UbJk7g+GIRpm3y U8z80m3Hgv40MDjOpFMaj6vPm7CX0YTcpPzvdur9qY4Q+vdGFfvc8r6xmKp7LAwy wzzJDo/L/bdldArbGfH8z+RScA4qzuXic7sQTF3ibkCQZM2UDX0KH+n/xPAB0Tg4 HG96sNhfH61r9A9E5e5PTdIvlGEMRWPlSJzBvH9VQJfHgeqXER6QnCaORIh5IUfO CK5qknWt23cp8ye+clHmDnqgC8fWiW7CxdgYxD4uj1HD+A94sYGgE1ZolxCPjoU9 kv/MpXYHFyYTU5CTThTlCS/7LmzeMr0Hyqxae5KU6dRiCCkyGKKqUCXhpOkAiyI1 O3yD6JbeD9XizNOaDwmXhPkEAuqU+A3AA9PUjN7QXVwaMpzd+fmCqvK53C0NfTNR 2vZxELskBER/mEF/Zu1y =RijB -----END PGP SIGNATURE-----
Current thread:
- CVE request: Kernel 2.6.32+ IP_RETOPTS Buffer Poisoning DoS Steven Ciaburri (Jun 30)
- Re: CVE request: Kernel 2.6.32+ IP_RETOPTS Buffer Poisoning DoS Steven Ciaburri (Jun 30)
- Re: CVE request: Kernel 2.6.32+ IP_RETOPTS Buffer Poisoning DoS Kurt Seifried (Jun 30)
- Re: CVE request: Kernel 2.6.32+ IP_RETOPTS Buffer Poisoning DoS Kurt Seifried (Jun 30)
- Re: CVE request: Kernel 2.6.32+ IP_RETOPTS Buffer Poisoning DoS Steven Ciaburri (Jun 30)