Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 22 Nov 2013 13:16:45 -0800
From: Kees Cook <keescook@...omium.org>
To: oss-security@...ts.openwall.com
Cc: Nico Golde <nico@...lde.de>, Fabian Yamaguchi <fabs@...sec.de>
Subject: Linux kernel CVE fixes

Hi,

Here are some further issues found by Nico Golde and Fabian Yamaguchi:

http://git.kernel.org/linus/a497e47d4aec37aaf8f13509f3ef3d1f6a717d88
CVE-2013-6378

http://git.kernel.org/linus/c2c65cd2e14ada6de44cb527e7f1990bede24e15
CVE-2013-6379

http://git.kernel.org/linus/b4789b8e6be3151a955ade74872822f30e8cd914
CVE-2013-6380

http://git.kernel.org/linus/f856567b930dfcdbc3323261bf77240ccdde01f5
CVE-2013-6383

http://git.kernel.org/linus/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
CVE-2013-6381

linux-next "xfs: underflow bug in xfs_attrlist_by_handle()"
CVE-2013-6382

Thanks,

-Kees

-- 
Kees Cook
Chrome OS Security

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ