Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20140401183003.GT24029@dhcp-25-225.brq.redhat.com>
Date: Tue, 1 Apr 2014 20:30:04 +0200
From: Petr Matousek <pmatouse@...hat.com>
To: oss-security@...ts.openwall.com
Cc: ago@...too.org, cve-assign@...re.org
Subject: Re: Re: CVE request: Linux Kernel, two security issues

On Sun, Mar 30, 2014 at 05:42:52PM -0400, cve-assign@...re.org wrote:
> > http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=21f8aaee0c62708654988ce092838aa7df4d25d8
> > 
> > The vulnerability is caused due to a race condition error in the 
> > "ath_tx_aggr_sleep()" function (drivers/net/wireless/ath/ath9k/xmit.c), which 
> > can be exploited to cause a crash.
> > https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.15
> > https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.13.7
> > https://bugzilla.kernel.org/show_bug.cgi?id=70551
> 
> Use CVE-2014-2672.

FWIW, there's also second commit mentioned in the bugzilla,
http://git.kernel.org/cgit/linux/kernel/git/jberg/mac80211.git/commit/?id=1d147bfa64293b2723c4fec50922168658e613ba
that also fixes a crash.

It is questionable how the attacker can trigger these bugs differently
than normal (high load) usage on a smp box.

-- 
Petr Matousek / Red Hat Security Response Team
PGP: 0xC44977CA 8107 AF16 A416 F9AF 18F3  D874 3E78 6F42 C449 77CA

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.