Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 05 Mar 2014 08:23:53 +0100
From: Salva Peiró <speiro@....upv.es>
To: oss-security@...ts.openwall.com
Subject: CVE Request: staging/cxt1e1/linux.c: Correct arbitrary memory write
 in c4_ioctl()

Hi,

I've found a vulnerability in the staging kernel tree,
Can anyone assign a CVE ID for this?

- staging/cxt1e1/linux.c: Correct arbitrary memory write in c4_ioctl()
https://git.kernel.org/cgit/linux/kernel/git/gregkh/staging.git/commit/?h=staging-linus&id=084b6e7765b9554699afa23a50e702a3d0ae4b24

Thanks!

Salva Peiro http://speirofr.appspot.com


Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ