aboutsummaryrefslogtreecommitdiffstats
path: root/Documentation/x86/x86_64/uefi.txt
diff options
context:
space:
mode:
authorTyler Hicks <tyhicks@canonical.com>2013-06-20 13:13:59 -0700
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2013-07-13 10:34:43 -0700
commit314d3e7c43ea9125ef257dad74f494c0c82b7fe3 (patch)
treea930935c535723209306542cbf0ce0c00528b98c /Documentation/x86/x86_64/uefi.txt
parent2d0ed86595ca3a101c710efaec7aab0ca69c76da (diff)
downloadkernel_samsung_aries-314d3e7c43ea9125ef257dad74f494c0c82b7fe3.zip
kernel_samsung_aries-314d3e7c43ea9125ef257dad74f494c0c82b7fe3.tar.gz
kernel_samsung_aries-314d3e7c43ea9125ef257dad74f494c0c82b7fe3.tar.bz2
libceph: Fix NULL pointer dereference in auth client code
commit 2cb33cac622afde897aa02d3dcd9fbba8bae839e upstream. A malicious monitor can craft an auth reply message that could cause a NULL function pointer dereference in the client's kernel. To prevent this, the auth_none protocol handler needs an empty ceph_auth_client_ops->build_request() function. CVE-2013-1059 Signed-off-by: Tyler Hicks <tyhicks@canonical.com> Reported-by: Chanam Park <chanam.park@hkpco.kr> Reviewed-by: Seth Arnold <seth.arnold@canonical.com> Reviewed-by: Sage Weil <sage@inktank.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'Documentation/x86/x86_64/uefi.txt')
0 files changed, 0 insertions, 0 deletions