|
Message-ID: <4DC74A8A.5080108@redhat.com> Date: Mon, 09 May 2011 09:59:38 +0800 From: Eugene Teo <eugene@...hat.com> To: oss-security@...ts.openwall.com CC: Dan Rosenberg <dan.j.rosenberg@...il.com> Subject: Re: CVE request: kernel: DCCP invalid options On 05/09/2011 02:54 AM, Dan Rosenberg wrote: > On a providing a bad option length for certain DCCP options, a remote > host may cause parsing to read beyond the bounds of the incoming > packet. This may possibly cause a DoS by reading unmapped memory (if > you're unlucky), or it may allow an attacker to infer the contents of > kernel heap memory based on the parser's response. > > -Dan > > [1] http://marc.info/?l=linux-kernel&m=130468845209036&w=2 Use CVE-2011-1770. https://bugzilla.redhat.com/CVE-2011-1770 Thanks, Eugene
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.