|
|
Message-ID: <alpine.LFD.2.10.1401071251580.18916@wniryva.cad.erqung.pbz>
Date: Tue, 7 Jan 2014 13:04:29 +0530 (IST)
From: P J P <ppandit@...hat.com>
To: oss security list <oss-security@...ts.openwall.com>
cc: cve@...re.org
Subject: CVE split and a missed file
Hello,
Recently Mitre split up a cve 'CVE-2013-6405' into 3 separate CVEs. Each for
subset of files touched by a commit 'bceaa90240'.
-> https://git.kernel.org/linus/bceaa90240b6019ed73b49965eac7d167610be69
But the 3 new CVEs do not seem to cover patch to a file
-> net/ieee802154/dgram.c.
Is that intentional or a miss. (just checking)
===
Name: CVE-2013-6405
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6405 [Open URL]
Final-Decision:
Interim-Decision:
Modified:
Proposed:
Assigned: 20131104
Category:
** REJECT **
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2013-7263,
CVE-2013-7264, CVE-2013-7265. Reason: This candidate is a duplicate
of CVE-2013-7263, CVE-2013-7264, and CVE-2013-7265. Notes: All CVE
users should reference CVE-2013-7263, CVE-2013-7264, and/or
CVE-2013-7265 instead of this candidate. All references and
descriptions in this candidate have been removed to prevent accidental
usage.
--
CVE-2013-7263
The Linux kernel before 3.12.4 updates certain length values before
ensuring that associated data structures have been initialized, which
allows local users to obtain sensitive information from kernel stack
memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call,
related to net/ipv4/ping.c, net/ipv4/raw.c, net/ipv4/udp.c,
net/ipv6/raw.c, and net/ipv6/udp.c.
--
CVE-2013-7264
The l2tp_ip_recvmsg function in net/l2tp/l2tp_ip.c in the Linux kernel
before 3.12.4 updates a certain length value before ensuring that an
associated data structure has been initialized, which allows local
users to obtain sensitive information from kernel stack memory via a
(1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
--
CVE-2013-7265
The pn_recvmsg function in net/phonet/datagram.c in the Linux kernel
before 3.12.4 updates a certain length value before ensuring that an
associated data structure has been initialized, which allows local
users to obtain sensitive information from kernel stack memory via a
(1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
===
Thank you.
--
Prasad J Pandit / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.