Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 9 May 2014 19:03:44 +0530 (IST)
From: P J P <>
To: oss security list <>
Subject: CVE request Linux kernel: filter: prevent nla extensions to peek
 beyond the end of the message


Linux kenrel built with the BPF interpreter support in the networking core is 
vulnerable to an out of bounds buffer access flaw. It occurs when accessing a 
netlink attribute from the skb->data buffer.

An unprivileged user/program could use this flaw to crash the system kernel 
resulting in DoS.

Upstream fix:

Introduced by:

Thank you.
Prasad J Pandit / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ