|
Message-Id: <20141109230720.638216C0052@smtpvmsrv1.mitre.org> Date: Sun, 9 Nov 2014 18:07:20 -0500 (EST) From: cve-assign@...re.org To: meissner@...e.de Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: CVE Request: Linux kernel mac80211 plain text leak -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=338f977f4eb441e69bb9a46eaa0ac715c931a67f > > mac80211: fix fragmentation code, particularly for encryption > > we leak up to 8 bytes of plaintext (!) of the packet out into the air Use CVE-2014-8709. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJUX/LCAAoJEKllVAevmvmsusoIAJ2rb0ei0y0wWc8qj/mhxyoB NGR+h9roXElxgrG7fI1P0cTdb2FnBYiFlTHdy5Ydeegsqqbi7zftgwFyl3IUrvnZ u88rDdlQHh+ViqjAQqm+ULfnWtFuI+PTDn2JpWB+CeWDcyQDSvztrMD45dfi46i+ nGLUNnm7XHDnxHUDZ0qy8n6DHCCzb23FlkezKR2zhzDDPsYECJPe9kmS6nxYHvpL 20n7Ktbinai37Dor2/ayfQyC/GYFTMCOKp7ZcjhUeF8wxPoEZPe3V3po2Wo2fyRX YKgR+P6hRyFxb9iZ4EBvDWMxhbfw7M5oET9rYJaAC0pZYC0i9r+Lh425ZytR7EI= =0dvJ -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.