oss-sec mailing list archives
Re: CVE request - Linux kernel through 4.6.2 allows escalade privileges via IP6T_SO_SET_REPLACE compat setsockopt call
From: Greg KH <greg () kroah com>
Date: Thu, 29 Sep 2016 15:45:26 +0200
On Thu, Sep 29, 2016 at 07:43:35AM +0000, 张谦 wrote:
Hi there, I found a memory corruption vulnerabiliry in Linux kernel through 4.6.2, and I have a working exploit to escalade privileges which requires the ip6_tables module to be loaded, that it is properly blocked on all up-to-date versions. Due to the number of users running vulnerable code(not update to 4.7 or higher), and that this exploit is only available to security researchers and kernel packagers upon request but that I don't want it to spread. I have reported this issue to Linux kernel official and they have already fixed this.
Note, this was fixed many months ago, in May of 2016, and went into the stable kernel updates in June, 2016. Any distro that updated to the stable kernel updates received this fix then. Any distro that hasn't updated their kernel since then, well, you need to revaluate your trust of such a distro :) thanks, greg k-h
Current thread:
- CVE request - Linux kernel through 4.6.2 allows escalade privileges via IP6T_SO_SET_REPLACE compat setsockopt call 张谦 (Sep 29)
- Re: CVE request - Linux kernel through 4.6.2 allows escalade privileges via IP6T_SO_SET_REPLACE compat setsockopt call Greg KH (Sep 29)
- Re: CVE request - Linux kernel through 4.6.2 allows escalade privileges via IP6T_SO_SET_REPLACE compat setsockopt call Quentin Casasnovas (Sep 29)