Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 9 May 2014 19:03:44 +0530 (IST)
From: P J P <>
To: oss security list <>
Subject: CVE request Linux kernel: filter: prevent nla extensions to peek
 beyond the end of the message


Linux kenrel built with the BPF interpreter support in the networking core is 
vulnerable to an out of bounds buffer access flaw. It occurs when accessing a 
netlink attribute from the skb->data buffer.

An unprivileged user/program could use this flaw to crash the system kernel 
resulting in DoS.

Upstream fix:

Introduced by:

Thank you.
Prasad J Pandit / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.