Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Sat, 3 Dec 2016 00:29:12 +0100
From: Andrey Konovalov <andreyknvl@...gle.com>
To: cve-assign@...re.org
Cc: oss-security@...ts.openwall.com, Kostya Serebryany <kcc@...gle.com>, 
	Dmitry Vyukov <dvyukov@...gle.com>, syzkaller <syzkaller@...glegroups.com>, 
	Eric Dumazet <edumazet@...gle.com>
Subject: CVE Request: Linux: signed overflows for SO_{SND|RCV}BUFFORCE

Hi!

There's a bug in SO_{SND|RCV}BUFFORCE setsockopt() implementation,
which allows CAP_NET_ADMIN users to cause memory corruption.

The fix is upstream:
https://github.com/torvalds/linux/commit/b98b0bc8c431e3ceb4b26b0dfc8db509518fb290

Could you assign a CVE for this?

Thanks!

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.