diff options
author | Tyler Hicks <tyhicks@canonical.com> | 2013-06-20 13:13:59 -0700 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2013-07-13 10:34:43 -0700 |
commit | 314d3e7c43ea9125ef257dad74f494c0c82b7fe3 (patch) | |
tree | a930935c535723209306542cbf0ce0c00528b98c /Documentation/x86/x86_64/uefi.txt | |
parent | 2d0ed86595ca3a101c710efaec7aab0ca69c76da (diff) | |
download | kernel_samsung_aries-314d3e7c43ea9125ef257dad74f494c0c82b7fe3.zip kernel_samsung_aries-314d3e7c43ea9125ef257dad74f494c0c82b7fe3.tar.gz kernel_samsung_aries-314d3e7c43ea9125ef257dad74f494c0c82b7fe3.tar.bz2 |
libceph: Fix NULL pointer dereference in auth client code
commit 2cb33cac622afde897aa02d3dcd9fbba8bae839e upstream.
A malicious monitor can craft an auth reply message that could cause a
NULL function pointer dereference in the client's kernel.
To prevent this, the auth_none protocol handler needs an empty
ceph_auth_client_ops->build_request() function.
CVE-2013-1059
Signed-off-by: Tyler Hicks <tyhicks@canonical.com>
Reported-by: Chanam Park <chanam.park@hkpco.kr>
Reviewed-by: Seth Arnold <seth.arnold@canonical.com>
Reviewed-by: Sage Weil <sage@inktank.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'Documentation/x86/x86_64/uefi.txt')
0 files changed, 0 insertions, 0 deletions