[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] CVE request: Kernel 2.6.32+ IP_RETOPTS Buffer Poisoning DoS
From:       Kurt Seifried <kseifried () redhat ! com>
Date:       2013-06-30 23:01:15
Message-ID: 51D0B8BB.6010403 () redhat ! com
[Download RAW message or body]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 06/30/2013 01:33 AM, Steven Ciaburri wrote:
> There is a local DOS exploit in centos 6, openvz 6, cloudlinux 6
> and others.
> 
> https://www.rack911.com/poc/hemlock.c
> 

Please use CVE-2013-2224 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=RijB
-----END PGP SIGNATURE-----
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic