Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 27 Nov 2015 15:12:18 +0100
From: Adam Maris <>
Subject: CVE-2015-5327 kernel: User triggerable out-of-bounds read

An out-of-bounds memory read was found, affecting kernels from 4.3-rc1 onwards.
This vulnerability was caused by incorrect X.509 time validation in x509_decode_time() function in x509_cert_parser.c.

Adam Maris / Red Hat Product Security

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ