Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 04 Jul 2010 22:48:09 +0800
From: Eugene Teo <eugeneteo@...nel.sg>
To: oss-security@...ts.openwall.com
CC: Moritz Muehlenhoff <jmm@...til.org>,
        "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE Request: kernel: l2tp: Fix oops in pppol2tp_xmit

On 07/04/2010 07:13 PM, Moritz Muehlenhoff wrote:
> On Wed, Jun 23, 2010 at 11:43:51AM +0800, Eugene Teo wrote:
>> "When transmitting L2TP frames, we derive the outgoing interface's
>> UDP checksum hardware assist capabilities from the tunnel dst dev.
>> This can sometimes be NULL, especially when routing protocols are
>> used and routing changes occur. This patch just checks for NULL dst
>> or dev pointers when checking for netdev hardware assist features.
>>
>>      BUG: unable to handle kernel NULL pointer dereference at 0000000c
>>      IP: [<f89d074c>] pppol2tp_xmit+0x341/0x4da [pppol2tp]
>>      *pde = 00000000
>>      Oops: 0000 [#1] SMP
>>      last sysfs file: /sys/class/net/lo/operstate
>> [...]"
>>
>> Introduced in ffcebb16 (v2.6.29-rc1~581), fixed in 3feec909 (fixed
>> in v2.6.34-rc2). (It was later split into different files in commit
>> fd558d18 v2.6.35-rc1).
>>
>> I'm not requesting a CVE name for this because it did not affect any
>> of our supported kernels. FYI.
>
> Steve, please assign a CVE ID for this.

cc'ed coley@...us.mitre.org.

Please change the subject as well so that we know this needs a CVE name.

Thanks, Eugene
-- 
main(i) { putchar(182623909 >> (i-1) * 5&31|!!(i<7)<<6) && main(++i); }

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ