From: Steffen Klassert <[email protected]> Date: Mon, 17 Sep 2012 09:16:42 +0200
> On Thu, Sep 13, 2012 at 11:41:26PM +0200, Mathias Krause wrote: >> When dump_one_state() returns an error, e.g. because of a too small >> buffer to dump the whole xfrm state, xfrm_state_netlink() returns NULL >> instead of an error pointer. But its callers expect an error pointer >> and therefore continue to operate on a NULL skbuff. >> >> This could lead to a privilege escalation (execution of user code in >> kernel context) if the attacker has CAP_NET_ADMIN and is able to map >> address 0. > > Or it simply crashes with a NULL pointer dereference. > >> >> Cc: [email protected] >> Signed-off-by: Mathias Krause <[email protected]> > > Acked-by: Steffen Klassert <[email protected]> Applied, and queued up for -stable. Please do not CC: stable explicitly in your patch submissions, I removed it from the patch. Instead, ask me to queue the patch up for -stable. We handle stable submissed via a patch queue which I maintain at: http://patchwork.ozlabs.org/user/bundle/2566/?state=* so that I can let patches cook in Linus's tree for a length of time of my choosing, rather than having bug fixes automatically propagate the moment it hits Linus's tree. Thanks. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [email protected] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/

