Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sat, 10 Oct 2015 11:34:48 -0400 (EDT)
From: cve-assign@...re.org
To: guoyonggang@....cn
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request - Android OS - Using the PPP character device driver caused the system to restart - Linux kernel

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> arg>>16 > 255 and 0xFFFF&arg > 255), which will lead to the use of
> null pointers in the kernel

>> https://code.google.com/p/android/issues/detail?id=187973

>> /dev/ppp is only accessible by root on Android so there's no security
>> impact on Android unless you can figure out how to get kernel code
>> execution out of a null pointer deref ... this is an issue with the
>> upstream Linux kernel

> Solution:
>       Add a judge in front of "ts = comp->tstate;"

> struct slcompress *
> slhc_init(int rslots, int tslots)
> ...
>       if ( tslots > 0 ) {
>            if(comp->tstate != NULL){
>                  ts = comp->tstate;
>                  for(i = comp->tslot_limit; i > 0; --i){

(not yet available at
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/log/drivers/net/slip/slhc.c)

Use CVE-2015-7799.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=+L4m
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.