Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 6 Dec 2013 18:01:53 +0400
From: Vasily Kulikov <>
Subject: Re: CVE request: Kernel: ping: NULL pointer
 dereference on write to msg_name


On Fri, Dec 06, 2013 at 19:13 +0530, P J P wrote:
> Linux kernel built with the TCP/IP networking support(CONFIG_NET) is
> vulnerable to a NULL pointer dereference flaw. It could occur via a
> plain read(2) call on a ping socket. Usage of ping sockets is
> generally restricted to privileged users.
> A user/program able to read from ping sockets could use this flaw to crash a
> system resulting in DoS.
> Upstream fix:
> -------------
>  ->
> Reference:
> ----------
>  ->

The bug was introduced with ping6 sockets implementation in:


Vasily Kulikov - bringing security into open computing environments

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.