Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <201406201517.s5KFHQOY005907@linus.mitre.org>
Date: Fri, 20 Jun 2014 11:17:26 -0400 (EDT)
From: cve-assign@...re.org
To: luto@...capital.net
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request: Another Linux syscall auditing bug

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> On a 32-bit x86 kernel with syscall auditing enabled, syscall(1000)
> will cause an OOPS.

> http://article.gmane.org/gmane.linux.kernel/1726110

> It appears that entry_32.S is missing any call to the audit exit hook
> on the badsys path.

Use CVE-2014-4508.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTpFAnAAoJEKllVAevmvmscoMH/jDdyfavkCGKGQG5PVlzlQwa
GkWdq8b4gHOVWSTonKZ9LqRA/NJmDwC7whOsPUX+aALF0jgmcvLAex2YTsscuXOX
6oE9XbFQ7spvV3mYcxammKu8NnxBc0n4JHpjR7Plhmus9dODnHHCWOMg4G+kwIo9
/GSzyuj9h/P/p37/01QmFqharNEPbzPyJ3JSoI8xgcRBe7Jwv8oaYn4XS8tmF8P/
xNGy5t6MXzGGL3ASfNFIzj3ZfcRz8BF7Vp/vJ76lWo0PrIz5jE0GnntgZiJ4mndA
JV0aqkpfKhfb5xbfVCdkfIzMBkY4bcVWwy33Qx8b74D4w3sOp9e6jNA3F5xYEZg=
=yLEq
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.