Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 20 Apr 2015 12:34:23 -0400 (EDT)
From: cve-assign@...re.org
To: danmcd@...iti.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request - illumos

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> Illumos bug #5853 (https://www.illumos.org/issues/5853), now fixed, can
> be exploited to escalate privilege. It's not easy to do so, but it is
> enough to cause concern and ask for a CVE number.
> 
> At least two distros already have this fix in place. I'd appreciate a
> CVE number (and if possible a way to request these on a non-public
> list... sorry if I missed the FAQ).

Yes, there can be a CVE mapping for this. However, because there's
additional information in https://www.illumos.org/issues/5853 that's
not discussed in your message, we don't know whether one or two CVE
IDs is the correct number.

If each of the two observations of "default error is negative one.
However, callers are expecting errnos or zero." and "we're supposed to
be checking the alignment of two different offsets, pfr_loff and
pfr_ioff, but end up checking pfr_loff twice" could be independently
exploitable, then there will be two CVE IDs. If only one is
exploitable, or if exploitation requires both, then there will be one
CVE ID.

The cve-assign@...re.org address can be used for non-public requests
for illumos CVEs. There may be other options for the open-source
parts, but we think that not all of illumos is open source.
http://wiki.illumos.org/display/illumos/illumos+FAQs says "There still
remain some binary-only, closed source components that we inherited
from Oracle." If the component also affects an Oracle product, then
Oracle could assign the CVE ID.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJVNSoVAAoJEKllVAevmvmsdNUH/i2pmI4pWlW/hREqWhMt15HG
tjkozI17nMUh3RRGp0eYcc0lHUVMlvSTcEZI/4XNhtSh5RaUlHSEYEolvE767WY8
odgLDuQK8yvDTpXA0rxvmnYiBy4ZR+kZrmx2ejtJfSeR7df7UwjpMwSJYyoirffa
wbfqxv1Pniww9tN1GfZyPIg9Hf6+9ib+QB/CZhzW5nF/7XLlvcttRzPeO5lxEN5V
y/0b5i73N0KD1QfF7ubNG4hIa3foXkz4v2UplAy5XYt/Zw6la4v9XNKNReP+bLRj
MxTuluANPV5U62wSy5h27QpzfZaHKoJjCoYNurl3BYfribv6hoNa7Wle4ZCJKsg=
=d2+H
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ