Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <201402201742.s1KHg2BD015659@linus.mitre.org>
Date: Thu, 20 Feb 2014 12:42:02 -0500 (EST)
From: cve-assign@...re.org
To: ppandit@...hat.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request: Linux kernel: nfs: information leakage

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

This is definitely a problem that can have a CVE ID; use
CVE-2014-2038.

However, is "A user/program could use this flaw to leak kernel memory
bytes" the only impact? In

  https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=263b4509ec4d47e0da3e753f85a39ea12d1eff24

is there also an opportunity for Client B to conduct a DoS attack
against Client A (i.e., causing Client A's data to be completely lost)
if the NFSv4 ACL on /mnt/file gives Client B APPEND_DATA access but
not WRITE_DATA access?

Our understanding is that you mean the "extra" bytes printed by the
cat command, i.e.,

   0 \357 \277 \275 D 0 \357 \277 \275

are the leaked kernel memory bytes.

Unless someone has an alternative interpretation, this would most
likely be covered by a single CVE (i.e., "does not always verify that
the cached page is up-to-date" is the root cause; information
disclosure and a possible DoS are the impacts).

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTBj2PAAoJEKllVAevmvms+f4H/iv05BaZSO4Uekg29J+rocqd
cG3tjUVOa9/3+9AMJooAtY8kUIDqrZ55q7WvuQPsMli6gE1ibGKGBTMVAyXtIj57
lI9PQBPOx8i6b31Mfxo/Gb+TbsXOQzAgMTs3OKtuYeUUrY6wt0tVikMpYHrr7/J2
LvMAZP6ZmG5aTYkvFJamnkmyH+U0rjk2arhZz4YOWFPuTPPFhqrMX/wivulDoDqT
MZDPLK7lo7QJuSXCxtsA8xYOSBIB9HPY11E5M11qFErG7CZhgPINxg/KG4HQmjLO
4p1Tvnz37pjLvD3XkHPXTVRCMFROST/uwoH/L9lOctsr3+Dt8OT62MZ/yp2/p88=
=NFAO
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.