First published: Mon Mar 17 2014(Updated: )
Description of the problem: Some occurences in the netfilter tree use skb_header_pointer() in the following way ... struct dccp_hdr _dh, *dh; ... skb_header_pointer(skb, dataoff, sizeof(_dh), &dh); ... where dh itself is a pointer that is being passed as the copy buffer. Instead, we need to use &_dh as the forth argument so that we're copying the data into an actual buffer that sits on the stack. A remote attacker could use this flaw to crash the system or, potentially, escalate their privileges on the system. References: <a href="http://www.openwall.com/lists/oss-security/2014/03/17/3">http://www.openwall.com/lists/oss-security/2014/03/17/3</a> Introduced by: <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2bc780499aa3">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2bc780499aa3</a> Upstream fix: <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b22f5126a24b">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b22f5126a24b</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <3.2.57 | |
Linux Linux kernel | >=3.3<3.4.86 | |
Linux Linux kernel | >=3.5<3.10.36 | |
Linux Linux kernel | >=3.11<3.12.17 | |
Linux Linux kernel | >=3.13.0<3.13.9 | |
Canonical Ubuntu Linux | =10.04 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.