Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <20150922205117.F1154B2E1BC@smtpvbsrv1.mitre.org>
Date: Tue, 22 Sep 2015 16:51:17 -0400 (EDT)
From: cve-assign@...re.org
To: ben@...adent.org.uk
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com, sfjro@...rs.sourceforge.net
Subject: Re: CVE request: Use-after-free in Linux kernel with aufs mmap patch

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> The aufs (Advanced Union Filesystem) project provides an optional patch
> for the Linux kernel

> introduces later uses of the vma, resulting
> in a potential use-after-free.  This is certainly exploitable for a
> minor denial of service (BUG in process context, so the task can't be
> cleaned up properly but the system does not panic) but might also be
> usable for privilege escalation.

>> Date: Sat, 19 Sep 2015 07:08:18 +0900
>> From: sfjro@...rs.sourceforge.net

>> I confirmed that Ben Hutchings' patch is correct

Use CVE-2015-7312.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=fSPy
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.