Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 462456 (CVE-2012-3552) - Kernel : net: slab corruption due to improper synchronization around inet->opt (CVE-2012-3552)
Summary: Kernel : net: slab corruption due to improper synchronization around inet->op...
Status: RESOLVED OBSOLETE
Alias: CVE-2012-3552
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Kernel Security
URL: http://www.openwall.com/lists/oss-sec...
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2013-03-20 10:03 UTC by Agostino Sarubbo
Modified: 2018-04-04 19:47 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-03-20 10:03:31 UTC
From $URL :

On Fri, Aug 31, 2012 at 06:11:53PM +0200, Petr Matousek wrote:
> Description of the problem:
> Lack proper synchronization to manipulate inet->opt ip_options can lead
> to system crash.
> 
> Problem is that ip_make_skb() calls ip_setup_cork() and ip_setup_cork()
> possibly makes a copy of ipc->opt (struct ip_options), without any
> protection against another thread manipulating inet->opt. Another thread
> can change inet->opt pointer and free old one under us.
> 
> Given right server application (setting socket options and processing
> traffic over the same socket at the same time), remote attacker could
> use this flaw to crash the system. More likely though, local
> unprivileged user could use this flaw to crash the system.

What are our reasons to claim that this is merely a DoS, as opposed to a
potential for arbitrary code execution with kernel privileges (at least
in the local attack case)?

> Upstream fix:
> 
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=f6d8bd051c391c1c0458a30b2a7abcd939329259

This was assigned CVE-2012-3552:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3552
Comment 1 Christopher Díaz Riveros (RETIRED) gentoo-dev Security 2018-04-04 19:47:24 UTC
There are no longer any 2.x or <3.0 kernels available in the repository with
the exception of sys-kernel/xbox-sources which is unsupported by security.