Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <4DC74A8A.5080108@redhat.com>
Date: Mon, 09 May 2011 09:59:38 +0800
From: Eugene Teo <eugene@...hat.com>
To: oss-security@...ts.openwall.com
CC: Dan Rosenberg <dan.j.rosenberg@...il.com>
Subject: Re: CVE request: kernel: DCCP invalid options

On 05/09/2011 02:54 AM, Dan Rosenberg wrote:
> On a providing a bad option length for certain DCCP options, a remote
> host may cause parsing to read beyond the bounds of the incoming
> packet.  This may possibly cause a DoS by reading unmapped memory (if
> you're unlucky), or it may allow an attacker to infer the contents of
> kernel heap memory based on the parser's response.
>
> -Dan
>
> [1] http://marc.info/?l=linux-kernel&m=130468845209036&w=2

Use CVE-2011-1770.

https://bugzilla.redhat.com/CVE-2011-1770

Thanks, Eugene

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.