|
Message-Id: <20150502152817.6B38433204C@smtpvbsrv1.mitre.org> Date: Sat, 2 May 2015 11:28:17 -0400 (EDT) From: cve-assign@...re.org To: hotdog3645@...il.com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: CVE request for a fixed bug existed in all versions of linux kernel from KeenTeam -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > https://github.com/torvalds/linux/commit/a134f083e79fb4c3d0a925691e732c56911b4326 > ... networking fixes ... > 6) Unhash ping sockets properly. > a use-after-free bug which can lead to kernel arbitrary execution in > Linux kernel > to trigger the bug you need direct access to a ping socket > For linux PC, the normal user does not have the privilege to create a > icmp(ping) socket > we've successfully seen the potential that we can take advantage of > this bug to achieve privilege escalation (root) on android Use CVE-2015-3636. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJVROvqAAoJEKllVAevmvmsyW4H/A4+sd5as/co6gUwbk8Nk0K8 +zA0YuvAVzHWaCPgcZixhPUJRtxT//cUHQaMBVSHCXECR6cdlvCWiD8z1AzsI3wX ECaMt7jJ1pdjXnuOfr8Fb4Qhu3JYfC4pVFspVOGb1Uk92XeICWBx7VdueRS1uisZ rpfgtgrsXiB4k5gRhP5M6pDzQzE1jlq1nA6Bqdq794YbrKwiU/F48h8uapKktZV2 acw6dsEgnPd2fnQEWWQ2KkS535DbFwbql/E9Zbknk+h+L6RGTiD69Qw6HgosCb49 ltzaJMKdF+KBGCJW4NLQbEH7hwzIvV4SRsUoKHv7TQM81OutzrEOo1UOSvkR+Ok= =FVXv -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.