Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 15 Sep 2014 13:23:30 -0400 (EDT)
From: cve-assign@...re.org
To: ppandit@...hat.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request Linux kernel: net: guard tcp_set_keepalive against crash

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> https://git.kernel.org/linus/3e10986d1d698140747fcfc2761ec9cb64c1d582
> https://bugzilla.redhat.com/show_bug.cgi?id=1141742

> A privileged user/process able to create RAW socket could use this flaw to
> crash the system kernel resulting in DoS.

Use CVE-2012-6657.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJUFyAGAAoJEKllVAevmvmsVrAH/2MCxNBia7m4Ly7aZPe1ixq4
mZXMDl4M2xLGrYiVMTCC9YUXP8uECdkSQwiJu2Owhzf8CYuMbZXLRLQ29/272fxh
PXGM1Gw7Xz1bxj0zbmrqePqRcWJu/xFYG69USJklljdoIr3SdP7lF9tin/suCnli
IfAfTk6GOIydVXqosjI7oxwr8Bqic74KON2EgrYYQ53ZApguK7rzdlZ9xoqm2p04
RVfeahLK70Zlny5vCpDBePJ78vohPXyXYXDms3hpsIozwTGWDVfSqINtw/8W1TFx
J2PKLA8vhcB9ryOi2jW6Ks+OMvtlr4mmhey6w6Pv1wuejYO6IueGIlJm156nIf4=
=QOzi
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.