Bug 1436658 - kernel: ping socket / AF_LLC connect() sin_family race
Summary: kernel: ping socket / AF_LLC connect() sin_family race
Keywords:
Status: CLOSED DUPLICATE of bug 1436649
Alias: None
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1436662 1436663
Blocks: 1436660
TreeView+ depends on / blocked
 
Reported: 2017-03-28 11:59 UTC by Adam Mariš
Modified: 2019-09-29 14:08 UTC (History)
32 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2017-03-28 12:06:34 UTC
Embargoed:


Attachments (Terms of Use)

Description Adam Mariš 2017-03-28 11:59:20 UTC
Null pointer dereference vulnerability in ping_v4_unhash() in net/ipv4/ping.c on RHEL-7 was found.

PoC can be found here:

http://seclists.org/oss-sec/2017/q1/675

Proposed patch:

http://seclists.org/oss-sec/2017/q1/677

Comment 1 Adam Mariš 2017-03-28 12:04:33 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1436662]

Comment 2 Adam Mariš 2017-03-28 12:06:34 UTC

*** This bug has been marked as a duplicate of bug 1436649 ***


Note You need to log in before you can comment on or make changes to this bug.