Date: Fri, 11 Apr 2014 13:56:34 +0200 From: Petr Matousek <pmatouse@...hat.com> To: oss-security@...ts.openwall.com Cc: Mateusz Guzik <mguzik@...hat.com> Subject: CVE request -- Linux kernel: net: ping: refcount issue in ping_init_sock() function A flaw was found in the way ping_init_sock() function handled group_info struct reference counter. Since group_info refcounter is only incremented but never decremented in this codepath, it could lead to refcounter overflow and possibly to use-after-free issue later. An unprivileged local user could use this flaw to crash the system or, potentially, escalate their privileges on the system. Upstream patch proposal: https://lkml.org/lkml/2014/4/10/736 References: https://bugzilla.redhat.com/show_bug.cgi?id=1086730 Thanks, -- Petr Matousek / Red Hat Security Response Team PGP: 0xC44977CA 8107 AF16 A416 F9AF 18F3 D874 3E78 6F42 C449 77CA
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ