[Git][cip-project/cip-kernel/cip-kernel-sec][bwh/update-issues] Add comment about likely un-exploitability of CVE-2019-16089


Agustin Benito Bethencourt
 

Ben Hutchings pushed to branch bwh/update-issues at cip-project / cip-kernel / cip-kernel-sec

Commits:

  • 7390255e
    by Ben Hutchings at 2019-09-13T21:14:59Z
    Add comment about likely un-exploitability of CVE-2019-16089
    
    Signed-off-by: Ben Hutchings <ben.hutchings@...>
    

1 changed file:

Changes:

  • issues/CVE-2019-16089.yml
    ... ... @@ -4,3 +4,10 @@ references:
    4 4
     - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16089
    
    5 5
     introduced-by:
    
    6 6
       mainline: [47d902b90a32a42a3d33aef3a02170fc6f70aa23]
    
    7
    +comment:
    
    8
    +  bwh: |
    
    9
    +    nla_nest_start() will only fail if there is insufficient space in
    
    10
    +    the given skb.  This does seem to be possible in theory, as the
    
    11
    +    size nbd_genl_status() requests does not account for the size of
    
    12
    +    nested attribute headers.  In practice skb sizes are cache-line-
    
    13
    +    aligned and that will probably avoid failure at this point.

  • Join cip-dev@lists.cip-project.org to automatically receive all group messages.