Bugzilla – Full Text Bug Listing |
Summary: | VUL-0: CVE-2015-1573: kernel: panic while flushing nftables rules that reference deleted chains. | ||
---|---|---|---|
Product: | [Novell Products] SUSE Security Incidents | Reporter: | Johannes Segitz <jsegitz> |
Component: | Incidents | Assignee: | Security Team bot <security-team> |
Status: | RESOLVED UPSTREAM | QA Contact: | Security Team bot <security-team> |
Severity: | Minor | ||
Priority: | P3 - Medium | CC: | bpetkov, mhocko, mkubecek, smash_bz |
Version: | unspecified | ||
Target Milestone: | --- | ||
Hardware: | Other | ||
OS: | Other | ||
URL: | https://smash.suse.de/issue/113712/ | ||
Whiteboard: | CVSSv2:RedHat:CVE-2015-1573:2.4:(AV:L/AC:H/Au:S/C:P/I:P/A:N) CVSSv2:NVD:CVE-2015-1573:4.9:(AV:L/AC:L/Au:N/C:N/I:N/A:C) | ||
Found By: | Security Response Team | Services Priority: | |
Business Priority: | Blocker: | --- | |
Marketing QA Status: | --- | IT Deployment: | --- |
Description
Johannes Segitz
2015-02-11 08:21:25 UTC
bugbot adjusting priority Michal, can you please take a look. As nftables were added in mainline 3.13 and were not backported to SLE12, this should only affect openSUSE 13.2 (the fix is in 3.19-rc5 and Factory already has 3.19.3). I'll check if 13.2 is really affected and prepare a backport if it is. After some unsuccessful attempts to reproduce the issue, I checked the code. Apparently the buggy code (and, actually, the ability to flush the entire table (not only rules in it) wasn't added until v3.18-rc1. Therefore none of our kernels is curently vulnerable (master/stable are already fixed and released SLE/openSUSE kernels never were). Reassigning back to the Security team. is only upstream |