Overview
About vulnerability
In the Linux kernel, the following vulnerability has been resolved:
phonet/pep: refuse to enable an unbound pipe
This ioctl() implicitly assumed that the socket was already bound to a valid local socket name, i.e. Phonet object. If the socket was not bound, two separate problems would occur:
- We’d send an pipe enablement request with an invalid source object.
- Later socket calls could BUG on the socket unexpectedly being connected yet not bound to a valid object.
Details
- Affected product:
- CentOS 6 ELS , CloudLinux 6 ELS , Oracle Linux 6 ELS , Ubuntu 16.04 ELS , Ubuntu 18.04 ELS
- Affected packages:
- linux @ 4.15.0 (+5 more)
In the Linux kernel, the following vulnerability has been resolved:
phonet/pep: refuse to enable an unbound pipe
This ioctl() implicitly assumed that the socket was already bound to a valid local socket name, i.e. Phonet object. If the socket was not bound, two separate problems would occur:
- We’d send an pipe enablement request with an invalid source object.
- Later socket calls could BUG on the socket unexpectedly being connected yet not bound to a valid object.