|
Message-ID: <CAG0ev15p0b8Jd5paQn0VDcU0KKdLHhwTKXiSJJr9ysxAZC=fgg@mail.gmail.com> Date: Fri, 5 Aug 2016 11:39:40 +0800 From: 0xr0ot <0xr0ot.sec@...il.com> To: oss-security@...ts.openwall.com, mobile.security@...sung.com Subject: Fwd: CVE request - samsumg android phone SVE-2016-6244 Possible Privilege Escalation in telecom ---------- Forwarded message ---------- From: <cve-assign@...re.org> Date: 2016-08-03 20:50 GMT+08:00 Subject: Re: CVE request - samsumg android phone SVE-2016-6244 Possible Privilege Escalation in telecom To: 0xr0ot.sec@...il.com Cc: cve-assign@...re.org -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 > http://security.samsungmobile.com/smrupdate.html#SMR-AUG-2016 > SVE-2016-6242: Possible Privilege Escalation in telecom > > Severity: Medium > Affected versions: L(5.0/5.1), M(6.0) > Reported on: May 11, 2016 > Disclosure status: Privately disclosed. > A vulnerability in SpamCall Activity components of Telecom application > can make crash and reboot a device when the malformed serializable > object is passed. > The patch complements the exception handling routine to prevent crash. Use CVE-2016-6526. > SVE-2016-6244: Possible Privilege Escalation in telecom > > Severity: Medium > Affected versions: L(5.0/5.1), M(6.0) > Reported on: May 11, 2016 > Disclosure status: Privately disclosed. > The vulnerability in SmartCall Activity components of Telecom > application can make crash and reboot a device when the malformed > serializable object is passed. > The patch complements the exception handling routine to prevent crash. Use CVE-2016-6527. - -- CVE Assignment Team M/S M300, 202 Burlington Road, Bedford, MA 01730 USA [ A PGP key is available for encrypted communications at http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJXoefoAAoJEHb/MwWLVhi2vr0QAJ693LUFVlPVq2YI5Qp7Yeeb 3MF/kN4Xa9IZGoxNtNomEKfewInUU3jec9nEVyobchIdsJzYzzeL2OMwVjh2CvXU UjCJylCCdzgXsOqCN2ULgLJlJP1zRHrptMkZsfYuJDIn5LFPtP//sBQuQe8Vmx7+ UsRXCY6eOT+icS7puohFEaUs6eD96Hs/Zob+h5UOozmGQosdZMfLJHyPV30Nr4h9 n/tqxVzWF/cnAZz6byui4y9zRrG7CtxsQ2VQvvVYR63iCJxziTFmBMqtkWnZrhvH CLKi8M5E5SN9hQvfKDobYUThoDrife5JcPftQr3tOVJSjYA0W6ZqcLP8Aclsko2X Fnw0SwVXUU80s2rFgZgVRgPHcrcA0EIiEXfrjxbIAU+ht8ACzQaSgF5Csc9/Jld3 hkNEg3JSr5gJsdQNDNuhJA6ysyaPwh8p0X7+9nb84CYmpsMwKAi1BnWyl/FNrGR4 NewVzNbLJmYZUBKjd1sMvn2Q+uvm+iRX9K+muikSXdj5vz5txXkQDU6Vy8Xwyja8 O2gDMrGTzX9DqXpPKCrm8z93EJI+/PT/9DHmLCJwJahtl+u/yN+nagGLl2gtfMAw 5nuE89pMAoZZ/sqBFQ3ir82mVJh/bm2T2sHO+R8ljvkHB3ERQrz3Hs7JIf4mCG1b cx4bYNZHgZIF+KP1I5oF =1SXm -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.