oss-sec mailing list archives

Re: CVE request: Kernel: ping: NULL pointer dereference on write to msg_name


From: Kurt Seifried <kseifried () redhat com>
Date: Fri, 06 Dec 2013 11:43:55 -0700

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 12/06/2013 07:01 AM, Vasily Kulikov wrote:
Hi,

On Fri, Dec 06, 2013 at 19:13 +0530, P J P wrote:
Linux kernel built with the TCP/IP networking support(CONFIG_NET)
is vulnerable to a NULL pointer dereference flaw. It could occur
via a plain read(2) call on a ping socket. Usage of ping sockets
is generally restricted to privileged users.

A user/program able to read from ping sockets could use this flaw
to crash a system resulting in DoS.

Upstream fix: ------------- ->
https://git.kernel.org/linus/cf970c002d270c36202bd5b9c2804d3097a52da0



Reference:
---------- ->
https://bugzilla.redhat.com/show_bug.cgi?id=1039046

The bug was introduced with ping6 sockets implementation in:

https://git.kernel.org/linus/6d0bfe22611602f36617bc7aa2ffa1bbb2f54c67

 Thanks,

Please use CVE-2013-6432 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.15 (GNU/Linux)
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=/c5r
-----END PGP SIGNATURE-----


Current thread: