Date: Tue, 12 May 2020 17:46:44 +0530 (IST) From: P J P <ppandit@...hat.com> To: oss security list <oss-security@...ts.openwall.com> cc: Paolo Abeni <pabeni@...hat.com>, matthew.sheets@...ms.com, Tyler Hicks <code@...icks.com> Subject: CVE-2020-10711 Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category Hello, NULL pointer dereference(s) issue(s) was found in the Linux kernel's SELinux subsystem. It occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into SELinux's extensible bitmap via 'ebitmap_netlbl_import' routine. While parsing the CIPSO restricted bitmap tag in 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that category bitmap is present, even if it has not been allocated. This leads to the said NULL pointer dereference issue while importing the same category bitmap into SELinux. A remote network user could use this flaw to crash the system kernel resulting in DoS scenario. This issue was introduced by upstream commit: -> https://git.kernel.org/linus/4b8feff251da3d7058b5779e21b33a85c686b974 netlabel: fix the horribly broken catmap functions * This issue was reported by Matthew Sheets (CC'd). * Please see a proposed fix patch attached herein. Thank you. -- Prasad J Pandit / Red Hat Product Security Team 8685 545E B54C 486B C6EB 271E E285 8B5A F050 DE8D View attachment "linux-netlabel-cope-with-null-catmap.patch" of type "text/plain" (3004 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.