Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 11 Apr 2014 13:56:34 +0200
From: Petr Matousek <>
Cc: Mateusz Guzik <>
Subject: CVE request -- Linux kernel: net: ping: refcount issue in
 ping_init_sock() function

A flaw was found in the way ping_init_sock() function handled group_info
struct reference counter. Since group_info refcounter is only
incremented but never decremented in this codepath, it could lead to
refcounter overflow and possibly to use-after-free issue later.

An unprivileged local user could use this flaw to crash the system or,
potentially, escalate their privileges on the system.

Upstream patch proposal:


Petr Matousek / Red Hat Security Response Team
PGP: 0xC44977CA 8107 AF16 A416 F9AF 18F3  D874 3E78 6F42 C449 77CA

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ