Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20160929135430.GA11369@chrystal.uk.oracle.com>
Date: Thu, 29 Sep 2016 15:54:30 +0200
From: Quentin Casasnovas <quentin.casasnovas@...cle.com>
To: oss-security@...ts.openwall.com
Cc: "cve-assign@...re.org" <cve-assign@...re.org>
Subject: Re: CVE request - Linux kernel through 4.6.2 allows
 escalade privileges via IP6T_SO_SET_REPLACE compat setsockopt call

On Thu, Sep 29, 2016 at 07:43:35AM +0000, 张谦 wrote:
> Hi there,
> I found a memory corruption vulnerabiliry in Linux kernel through 4.6.2, and I have a working exploit to escalade privileges which requires the ip6_tables module to be loaded, that it is properly blocked on all up-to-date versions.
> Due to the number of users running vulnerable code(not update to 4.7 or higher), and that this exploit is only available to security researchers and kernel packagers upon request but that I don't want it to spread.
> 
> I have reported this issue to Linux kernel official and they have already fixed this.
> And I would like to request CVE-ID for this issue.
> 

This was already disclosed here and CVEs were assigned AFAICT:

 http://seclists.org/oss-sec/2016/q2/599

Quentin

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.