Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 12 May 2017 09:24:56 -0400 (EDT)
From: Vladis Dronov <vdronov@...hat.com>
To: oss-security@...ts.openwall.com
Subject: CVE-2017-7487: Linux kernel: ipx: call ipxitf_put() in ioctl error
 path

Hello,

A reference counter leak in Linux kernel in ipxitf_ioctl function was found
which results into use after free vulnerability that's triggerable from
unprivileged userspace when IPX interface is configured.

cvss3=5.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H
cwe=CWE-416

References:

https://patchwork.ozlabs.org/patch/757549/

https://bugzilla.redhat.com/show_bug.cgi?id=1447734

Upstream patch:

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee0d8d8482345ff97a75a7d747efc309f13b0d80

Best regards,
Vladis Dronov | Red Hat, Inc. | Product Security Engineer

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.