Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 7 Feb 2017 01:54:17 -0500
From: <cve-assign@...re.org>
To: <andreyknvl@...gle.com>
CC: <cve-assign@...re.org>, <oss-security@...ts.openwall.com>,
	<dvyukov@...gle.com>, <edumazet@...gle.com>, <kcc@...gle.com>
Subject: Re: CVE Request: Linux: ip6_gre: invalid reads in ip6gre_err()

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> There's a bug in the Linux kernel ipv6 implementation which allows a
> remote attacker to trigger an out-of-bounds access.
> 
> Upstream fix:
> https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=7892032cfe67f4bde6fc2ee967e45a8fbaf33756

>> net/ipv6/ip6_gre.c

Use CVE-2017-5897.

- -- 
CVE Assignment Team
M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
[ A PGP key is available for encrypted communications at
  http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCAAGBQJYmW4FAAoJEHb/MwWLVhi2uhYP/2pSKh6yFBK9CK6Jw2o653a8
d7ye2bn4LW0eJhGCU/00ivQ3tZeQXBKxDis6AtTGlDIFdf6GWoITttPAYRDzkhka
CYvzuca1hn2jv2euRaDWzICwaFIe0YFAO2iinJz18UPns4ufHnO2gQIrZ04HoR2b
Rje1k/kVaQu7ppqrqZA260ONyAYerRYQzUipDGlBOVBsOf+Suu/ld4z+ehvo8p7x
rINrW14YpOi44g5i+mArD0337X82Yq+VHq/t03jkCluceiIJf1lHaojjv8wsOV2v
CS1K49EEZiK9RcwN61ZJSU5oGo0IrHU5WcJDW+tx45nshmcbUHDkQd2i4+xFTeGW
BrO/qBlQlj0GVz0FbprWv4GzgteJ7RM5cQZqJx6xVoZXszFALcYoDc+mLrjjgaYT
xIJjOgcyMYcPfR+GGDwMBvovV4QjsiWYccRADIBBH9TQ2mqfs9CAOaZxo6/dIouA
R8z6PlpXE5WYu4iUacgQe8U/Mli4VQrOIpe8kU42ZgLjGZJTvIHclO7uvK4FwIYS
njPf4Gkq+ozrNnZ2lyfvtpRlAXMz58skCI3FgzajeE3CjFW2T7re8aovSb2CwsB8
OzCdWzJZbhWI5/2v+SXndQEtKf4tUQBI4ed0I0UJc6uADTMz6j+QnD+opUFrslCH
B2rYgdMDYarkGw3Dv9zo
=k7MF
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ