Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sat, 24 Jan 2015 13:22:46 -0500 (EST)
From: cve-assign@...re.org
To: minipli@...glemail.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com, marc.deslauriers@...onical.com
Subject: Re: CVE Request: Linux kernel crypto api unprivileged arbitrary module load

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> Even though this was a new discovery, not explicitly mentioned in the
> initial report, it's the same bug, essentially -- using the AF_ALG
> interface to load arbitrary modules. In fact, commits 5d26a105b5a7 and
> 4943ba16bbc2 should have been a single one ...

Thanks for the additional clarification. However, we're planning to
keep the distinct IDs of CVE-2013-7421 and CVE-2014-9644. We don't
combine issues based only on finding that they affect the same module
and have the same impact, and were fixed at roughly the same time. The
4943ba16bbc2db05115707b3ff7b4874e9e3c560 example of loading
'vfat(blowfish)' is new attack information that wasn't obvious, and
didn't become public until 20 months later.

(In this type of situation, we would prefer two CVE IDs even if
everything had been fixed in a single commit. Admittedly, if there
were a single commit, and no other information were posted, it might
have been much harder to notice that there were two discoveries. So,
there might have been the less preferable outcome of one CVE ID.)

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJUw+KDAAoJEKllVAevmvms5nYH/j0K5Sd3M4yJWDxB2/kpF00A
cXJU3o+Mm8l/AjJEd3blJ4IKG4FavAKN3YRjxPfbhIj34p8SaYCdMmDVylXftvsi
3SiU9v7/k1q6U3JOh/jVj5gx+LsBlKmriL6TjqiBbGwjz3natEtXauRJ3/mIThxS
rDHSfMr8zDGDrjUB9zIy50C2eQcVuDkc8YD1xM5vwUm9cL2xbYS8dY15kEY8c/fB
J98yDVgGMdtZhr189yYnsRx6Cps/40wgpQ8D3/SBdUfN6nbv0M5Ao8X067y2L86y
VbpS29B4Q4X9PR1oTC8ZVR3FvykTjjJvz0BCMN9P2lFWADquRkMjQkulwOO9tjQ=
=/VtB
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ