Openwall GNU/*/Linux 3.0 - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 09 May 2011 09:59:38 +0800
From: Eugene Teo <eugene@...hat.com>
To: oss-security@...ts.openwall.com
CC: Dan Rosenberg <dan.j.rosenberg@...il.com>
Subject: Re: CVE request: kernel: DCCP invalid options

On 05/09/2011 02:54 AM, Dan Rosenberg wrote:
> On a providing a bad option length for certain DCCP options, a remote
> host may cause parsing to read beyond the bounds of the incoming
> packet.  This may possibly cause a DoS by reading unmapped memory (if
> you're unlucky), or it may allow an attacker to infer the contents of
> kernel heap memory based on the parser's response.
>
> -Dan
>
> [1] http://marc.info/?l=linux-kernel&m=130468845209036&w=2

Use CVE-2011-1770.

https://bugzilla.redhat.com/CVE-2011-1770

Thanks, Eugene

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ