Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <201401092201.s09M1GcH015434@linus.mitre.org>
Date: Thu, 9 Jan 2014 17:01:16 -0500 (EST)
From: cve-assign@...re.org
To: ppandit@...hat.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE split and a missed file

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

>  -> net/ax25/af_ax25.c

The unpatched code does not have the fundamental problem of updating
msg_namelen in a situation where "sax" is uninitialized.

>  -> net/rose/af_rose.c

The unpatched code does not have the fundamental problem of updating
msg_namelen in a situation where "srose" is uninitialized.

>  -> net/compat.c

This is for the case of a nonzero msg_namelen accompanied by a NULL
msg_name, as mentioned in the comment in the commit. The same choice
was made in net/core/iovec.c (a file that you didn't ask about).

>  -> net/socket.c

Lack of "msg_namelen = 0" statements is not something that would
really be considered a vulnerability in the previous net/socket.c
implementation. From the perspective of net/socket.c itself, the
"msg_namelen = 0" additions are a design improvement that can
contribute to the security of other code.

>  -> net/rxrpc/ar-recvmsg.c

The complete absence of a "msg_namelen =" statement in the unpatched
code seems to be a bug, but it's not the same as updating msg_namelen
in an uninitialized-data situation.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJSzxprAAoJEKllVAevmvmsUzMH/3VKhBHQipalZA4G+8mkscZK
fanNLNwhBXK61rhbQwewXbKAJu2/zuJlCYGiPJcMQ9zIUgRIl4cyDQMK0Wh9JtXc
0ThbrKFWx6Iwan6q/ygs7uX3jMJK2bhnjob8zt1ZN1etrsyTP4cIityk2n/nJf3e
HTeys00RVSUwo6P33EvVjYep8qvsf4ZzZq5Bh+WhxapgU0eCHisZ4+aKfOcvaIB4
qEJjVmr783/jSq0SlKEk9pKeeu6gLhcU0mrdQQ9fOEo3Bvp574W7jjel1IKPFpfO
OE+mP0ULvsE+cH1H/5WTLsxEAyK0GowfCiBH+5M/xdu/AXPx1hsZg4V9p40JnZ4=
=mqWd
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.