Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 29 Oct 2015 02:02:49 -0400 (EDT)
From: cve-assign@...re.org
To: sd@...asysnail.net
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com, hannes@...essinduktion.org
Subject: Re: CVE Request: Linux kernel: Buffer overflow when copying data from skbuff to userspace

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> http://patchwork.ozlabs.org/patch/530642/

> skb_copy_and_csum_datagram_iovec doesn't check the actual length of
> the iovec's buffers to which it copies data

Use CVE-2015-8019.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=37OD
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ