lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <hisntim4en6bh5ewqeaamirsq4f3ajax7f27dszntlqz3d3mz4@vkkkdvspxsu6>
Date: Fri, 30 Aug 2024 13:06:01 +0200
From: Michal Koutný <mkoutny@...e.com>
To: Willem de Bruijn <willemb@...gle.com>
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>, cve@...nel.org, 
	linux-kernel@...r.kernel.org, Tao Liu <thomas.liu@...oud.cn>
Subject: Re: CVE-2022-48936: gso: do not skip outer ip header in case of ipip
 and net_failover

On Thu, Aug 29, 2024 at 01:07:36PM GMT, Willem de Bruijn <willemb@...gle.com> wrote:
> With the fix backported to all these branches, not sure what, if
> anything, more is needed wrt the CVE.

My goal is to maintain some positive signal/noise in the assigned CVEs.

(Also, there are other kernel branches to evaluate as Greg says :-))

On Thu, Aug 29, 2024 at 12:53:34PM GMT, Willem de Bruijn <willemb@...gle.com> wrote:
> The patch reports that the negative effect is a drop due to a corrupted packet.
> 
> According to the CVE report this requires both user input with
> virtio_net_hdr, which is privileged, and a tunnel device configured,
> which again is privileged.

(Unless inside netns, I assume. Though...)
...that affects only scope of the same user, right? (The effect doesn't
cross boundary of any security domains.)

So far there is nothing in my (incomplete) understadning that would
classify this as a vulnerability (bugfix it is indeed).

Thanks,
Michal

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ