net/ceph/auth_none.c in the Linux kernel through 3.10 allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via an auth_reply message that triggers an attempted build_request operation.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2013/07/09/7 | third party advisory mailing list |
http://hkpco.kr/advisory/CVE-2013-1059.txt | third party advisory |
http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html | mailing list third party advisory vendor advisory |
https://bugzilla.redhat.com/attachment.cgi?id=767633&action=diff | issue tracking third party advisory |
http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00012.html | mailing list third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html | mailing list third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html | mailing list third party advisory vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=977356 | issue tracking third party advisory |
http://www.ubuntu.com/usn/USN-1941-1 | third party advisory vendor advisory |
http://www.ubuntu.com/usn/USN-1942-1 | third party advisory vendor advisory |