[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1361618028-9024-1-git-send-email-minipli@googlemail.com>
Date: Sat, 23 Feb 2013 12:13:46 +0100
From: Mathias Krause <minipli@...glemail.com>
To: "David S. Miller" <davem@...emloft.net>
Cc: netdev@...r.kernel.org, Mathias Krause <minipli@...glemail.com>
Subject: [PATCH 0/2] net: sock_diag fixes
Hi Dave,
this small series fixes an exploitable bug in sock_diag. An unprivileged
user can send us a netlink message resulting in an out-of-bounds access
that allows userland to take over control while in kernel mode.
The first patch fixes the bug and should be pushed to stable. The second
one is an attempt to cleanup the sock_diag_handlers[] access mess in
__sock_diag_rcv_msg.
Please apply!
Mathias Krause (2):
sock_diag: Fix out-of-bounds access to sock_diag_handlers[]
sock_diag: Simplify sock_diag_handlers[] handling in
__sock_diag_rcv_msg
net/core/sock_diag.c | 27 ++++++++++-----------------
1 file changed, 10 insertions(+), 17 deletions(-)
--
1.7.10.4
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists