Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <20150109072639.0D062332037@smtpvbsrv1.mitre.org>
Date: Fri,  9 Jan 2015 02:26:39 -0500 (EST)
From: cve-assign@...re.org
To: ppandit@...hat.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request Linux kernel: isofs: unchecked printing of ER records

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> Linux kernel built with the iso9660 file system(CONFIG_ISO9660_FS) support is
> vulnerable to an information leakage flaw. This could occur while accessing
> data on an iso9660 image with RockRidge extension reference(ER) records.
> 
> An unprivileged user/process could use this flaw to leak (=~255)kernel memory
> bytes.

> https://git.kernel.org/linus/4e2024624e678f0ebb916e6192bd23c1f9fdf696

Use CVE-2014-9584.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJUr4HxAAoJEKllVAevmvms/k0IAJhSnRXDX4ezUYzZfRnjW03u
Yup1CXnhWGp/A1oh+0BWXOpS68Qu0kazVhTSjrlypcH1lBB8JXAt6ciXrGhy48Mt
HgZUQptLJct3vncXXfa4D3whOaRKBzeBd/hrrEwxvWqDgVKArQ29sDq8I58Ug1v5
ZHTuhFRL+nbYBl4ke2oUMb3BySXHY38v9gx1W0o9vlRlogzPPEtttP3Q3WDv7NHT
Q+ReBNUG4xQXL98fxsl1OIxVtEqXE2XyLHDcYWSR8A9ipnq7qqKlCn82kefrb+4j
gm2YjsowzfP1V7c0TbKwS1vlQZOIooBqqEh+hOR4tKBZr/6hix/EjzBn/2ZS4/M=
=ZOSq
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.