Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 30 Jun 2013 17:01:15 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Steven Ciaburri <steve@...k911.com>
Subject: Re: CVE request: Kernel 2.6.32+ IP_RETOPTS Buffer
 Poisoning DoS

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 06/30/2013 01:33 AM, Steven Ciaburri wrote:
> There is a local DOS exploit in centos 6, openvz 6, cloudlinux 6
> and others.
> 
> https://www.rack911.com/poc/hemlock.c
> 

Please use CVE-2013-2224 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=RijB
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ