Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <20150603180125.9E00C6DC002@smtpvmsrv1.mitre.org>
Date: Wed,  3 Jun 2015 14:01:25 -0400 (EDT)
From: cve-assign@...re.org
To: ppandit@...hat.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request Linux kernel: fs: udf heap overflow in __udf_adinicb_readpage

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> Linux kernel built with the UDF file system(CONFIG_UDF_FS) support is
> vulnerable to a crash. It could occur while reading from a corrupted/malicious
> udf file system image.
> 
> An unprivileged user could use this flaw to crash the kernel resulting in DoS.
> 
> Upstream fixes:
> ---------------
>    -> https://git.kernel.org/linus/e159332b9af4b04d882dbcfe1bb0117f0a6d4b58
>    -> https://git.kernel.org/linus/e237ec37ec154564f8690c5bd1795339955eeef9
>    -> https://git.kernel.org/linus/a1d47b262952a45aae62bd49cfaf33dd76c11a2c

We feel that this is best covered by three CVE IDs, although not with
a one-to-one mapping. The "length can be too long" problems addressed
in all three commits are assigned CVE-2014-9728.
e159332b9af4b04d882dbcfe1bb0117f0a6d4b58 is also about a separate
data-structure consistency issue (the "iinfo->i_lenAlloc !=
inode->i_size" issue): this is assigned CVE-2014-9729. Finally,
e237ec37ec154564f8690c5bd1795339955eeef9 is also about a separate
state-identification issue ("properly ignore component length for
component types that do not use it"): this is assigned CVE-2014-9730.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJVb0ALAAoJEKllVAevmvmsOIAIAMI+XxEFI9Kv13jINfdgBMwR
jVgVlsl6ySo75fKDFAraEY6tUcLrm/01nP8iwCidDEt9HfBgToyut7V/1VZU57aK
S68LRGXfhjD8jSNzTP7pmJXY4PPE5R/9gmVQ+Yu4QKNPsrpJHl4O813T3qrYRKtM
hzinIacPhjoWkktra1QMWQBCOCfdP9Sz6fYRc+bTylgIz4sAzm2ftGIo+c1dvT5b
fPS1WqdiUWj9nxjEf/gaLqaYo6Aj2jNicS8vhl2VU/vMOswumf2A+kkM0xUsfS1B
vwoQ6Ebsa5fkPQ/rGg1nCHaT4jYMCF6o/R/SqyMx+4Jgv5euRwVZchOoenUzWTA=
=Glix
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.