|
Message-ID: <138470974.7338270.1494595496637.JavaMail.zimbra@redhat.com> Date: Fri, 12 May 2017 09:24:56 -0400 (EDT) From: Vladis Dronov <vdronov@...hat.com> To: oss-security@...ts.openwall.com Subject: CVE-2017-7487: Linux kernel: ipx: call ipxitf_put() in ioctl error path Hello, A reference counter leak in Linux kernel in ipxitf_ioctl function was found which results into use after free vulnerability that's triggerable from unprivileged userspace when IPX interface is configured. cvss3=5.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H cwe=CWE-416 References: https://patchwork.ozlabs.org/patch/757549/ https://bugzilla.redhat.com/show_bug.cgi?id=1447734 Upstream patch: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee0d8d8482345ff97a75a7d747efc309f13b0d80 Best regards, Vladis Dronov | Red Hat, Inc. | Product Security Engineer
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.