[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] CVE request - kernel: ip6_dst_lookup_tail() NULL pointer dereference
From:       Eugene Teo <eugene () redhat ! com>
Date:       2010-02-11 5:08:17
Message-ID: 4B7390C1.7020609 () redhat ! com
[Download RAW message or body]

ipv6: Fix OOPS in ip6_dst_lookup_tail().

This fixes kernel bugzilla 11469: "TUN with 1024 neighbours:
ip6_dst_lookup_tail NULL crash"

dst->neighbour is not necessarily hooked up at this point in the 
processing path, so blindly dereferencing it is the wrong thing to do. 
This NULL check exists in other similar paths and this case was just an 
oversight.

Also fix the completely wrong and confusing indentation here while we're 
at it.

References:
http://bugzilla.kernel.org/show_bug.cgi?id=11469
https://bugzilla.redhat.com/show_bug.cgi?id=563781

Upstream patch:
http://git.kernel.org/linus/e550dfb0c2c31b6363aa463a035fc9f8dcaa3c9b

Thanks, Eugene
-- 
Eugene Teo / Red Hat Security Response Team
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic