Re: [PATCH] tools: hv: Netlink source address validation allows DoS

2012-11-18 Thread Tomas Hozza
Hello. Just FYI there is already a CVE name CVE-2012-5532 for this issue. Regards, Tomas Hozza - Original Message - > On Thu, Nov 08, 2012 at 10:53:29AM +0100, Tomas Hozza wrote: > > The source code without this patch caused hypervkvpd to exit when > > it processed > > a spoofed Netlink

Re: [PATCH] tools: hv: Netlink source address validation allows DoS

2012-11-18 Thread Tomas Hozza
Hello. Just FYI there is already a CVE name CVE-2012-5532 for this issue. Regards, Tomas Hozza - Original Message - On Thu, Nov 08, 2012 at 10:53:29AM +0100, Tomas Hozza wrote: The source code without this patch caused hypervkvpd to exit when it processed a spoofed Netlink packet

Re: [PATCH] tools: hv: Netlink source address validation allows DoS

2012-11-15 Thread Tomas Hozza
- Original Message - > On Thu, Nov 08, 2012 at 10:53:29AM +0100, Tomas Hozza wrote: > > The source code without this patch caused hypervkvpd to exit when > > it processed > > a spoofed Netlink packet which has been sent from an untrusted > > local user. > > Now Netlink messages with a

Re: [PATCH] tools: hv: Netlink source address validation allows DoS

2012-11-15 Thread Greg KH
On Thu, Nov 08, 2012 at 10:53:29AM +0100, Tomas Hozza wrote: > The source code without this patch caused hypervkvpd to exit when it processed > a spoofed Netlink packet which has been sent from an untrusted local user. > Now Netlink messages with a non-zero nl_pid source address are ignored > and

Re: [PATCH] tools: hv: Netlink source address validation allows DoS

2012-11-15 Thread Greg KH
On Thu, Nov 08, 2012 at 10:53:29AM +0100, Tomas Hozza wrote: The source code without this patch caused hypervkvpd to exit when it processed a spoofed Netlink packet which has been sent from an untrusted local user. Now Netlink messages with a non-zero nl_pid source address are ignored and a

Re: [PATCH] tools: hv: Netlink source address validation allows DoS

2012-11-15 Thread Tomas Hozza
- Original Message - On Thu, Nov 08, 2012 at 10:53:29AM +0100, Tomas Hozza wrote: The source code without this patch caused hypervkvpd to exit when it processed a spoofed Netlink packet which has been sent from an untrusted local user. Now Netlink messages with a non-zero nl_pid

[PATCH] tools: hv: Netlink source address validation allows DoS

2012-11-08 Thread Tomas Hozza
The source code without this patch caused hypervkvpd to exit when it processed a spoofed Netlink packet which has been sent from an untrusted local user. Now Netlink messages with a non-zero nl_pid source address are ignored and a warning is printed into the syslog. Signed-off-by: Tomas Hozza

RE: [PATCH] tools: hv: Netlink source address validation allows DoS

2012-11-08 Thread KY Srinivasan
KY Srinivasan > Cc: Tomas Hozza > Subject: [PATCH] tools: hv: Netlink source address validation allows DoS > > The source code without this patch caused hypervkvpd to exit when it processed > a spoofed Netlink packet which has been sent from an untrusted local user. > Now Netlink me

[PATCH] tools: hv: Netlink source address validation allows DoS

2012-11-08 Thread Tomas Hozza
The source code without this patch caused hypervkvpd to exit when it processed a spoofed Netlink packet which has been sent from an untrusted local user. Now Netlink messages with a non-zero nl_pid source address are ignored and a warning is printed into the syslog. Signed-off-by: Tomas Hozza

[PATCH] tools: hv: Netlink source address validation allows DoS

2012-11-08 Thread Tomas Hozza
The source code without this patch caused hypervkvpd to exit when it processed a spoofed Netlink packet which has been sent from an untrusted local user. Now Netlink messages with a non-zero nl_pid source address are ignored and a warning is printed into the syslog. Signed-off-by: Tomas Hozza

RE: [PATCH] tools: hv: Netlink source address validation allows DoS

2012-11-08 Thread KY Srinivasan
Hozza Subject: [PATCH] tools: hv: Netlink source address validation allows DoS The source code without this patch caused hypervkvpd to exit when it processed a spoofed Netlink packet which has been sent from an untrusted local user. Now Netlink messages with a non-zero nl_pid source address

[PATCH] tools: hv: Netlink source address validation allows DoS

2012-11-08 Thread Tomas Hozza
The source code without this patch caused hypervkvpd to exit when it processed a spoofed Netlink packet which has been sent from an untrusted local user. Now Netlink messages with a non-zero nl_pid source address are ignored and a warning is printed into the syslog. Signed-off-by: Tomas Hozza