Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 15 Aug 2016 09:54:53 +0200
From: Greg KH <greg@...ah.com>
To: oss-security@...ts.openwall.com
Cc: cve-assign@...re.org
Subject: Re: Linux tcp_xmit_retransmit_queue use after free on
 4.8-rc1 / master

On Mon, Aug 15, 2016 at 09:20:17AM +0800, Marco Grassi wrote:
> Hello, this program will cause a use after free of read 4 in
> tcp_xmit_retransmit_queue or other tcp_ functions, often in another totally
> unrelated process.
> 
> reproducer + KASAN report is provided, tested on master available at the
> time of writing and on 4.8 rc1

Did you send this to the netdev@...r.kernel.org mailing list so that it
can get fixed?  I don't see it there :(

thanks,

greg k-h

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ