|
Message-Id: <20150109072639.0D062332037@smtpvbsrv1.mitre.org> Date: Fri, 9 Jan 2015 02:26:39 -0500 (EST) From: cve-assign@...re.org To: ppandit@...hat.com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: CVE request Linux kernel: isofs: unchecked printing of ER records -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > Linux kernel built with the iso9660 file system(CONFIG_ISO9660_FS) support is > vulnerable to an information leakage flaw. This could occur while accessing > data on an iso9660 image with RockRidge extension reference(ER) records. > > An unprivileged user/process could use this flaw to leak (=~255)kernel memory > bytes. > https://git.kernel.org/linus/4e2024624e678f0ebb916e6192bd23c1f9fdf696 Use CVE-2014-9584. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJUr4HxAAoJEKllVAevmvms/k0IAJhSnRXDX4ezUYzZfRnjW03u Yup1CXnhWGp/A1oh+0BWXOpS68Qu0kazVhTSjrlypcH1lBB8JXAt6ciXrGhy48Mt HgZUQptLJct3vncXXfa4D3whOaRKBzeBd/hrrEwxvWqDgVKArQ29sDq8I58Ug1v5 ZHTuhFRL+nbYBl4ke2oUMb3BySXHY38v9gx1W0o9vlRlogzPPEtttP3Q3WDv7NHT Q+ReBNUG4xQXL98fxsl1OIxVtEqXE2XyLHDcYWSR8A9ipnq7qqKlCn82kefrb+4j gm2YjsowzfP1V7c0TbKwS1vlQZOIooBqqEh+hOR4tKBZr/6hix/EjzBn/2ZS4/M= =ZOSq -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.