Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 19 Apr 2016 16:33:16 +0530 (IST)
From: P J P <ppandit@...hat.com>
To: OSS Security List <oss-security@...ts.openwall.com>
cc: security@...nel.org
Subject: Re: CVE Request: Linux kernel: remote buffer overflow
 in usbip

+-- On Tue, 19 Apr 2016, Marcus Meissner wrote --+
| https://github.com/torvalds/linux/commit/b348d7dddb6c4fbfc810b7a0626e8ec9e29f7cbb
|
| https://bugzilla.suse.com/show_bug.cgi?id=975945
| |The vulnerability is true. If an attacker can get a malicious package

'CVE-2016-3955' appears to have been assigned to it.

--
Prasad J Pandit / Red Hat Product Security Team
47AF CE69 3A90 54AA 9045 1053 DD13 3D32 FE5B 041F

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ