Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 30 Aug 2017 00:54:23 +0900
From: "Daisuke Noguchi[NRIセ
 キュア 野口]" <noguchi@...-secure.co.jp>
To: <oss-security@...ts.openwall.com>
CC: noguchi@...-secure.co.jp
Subject: ConnMan #ConnManDo Vulnerability

Hi ALL

We have published the web page which describes about detail of CVE-2017-12865, ConnMan vulnerability.
http://connmando.nri-secure.co.jp/index.html

This patch has been merged to master branch of debian and yocto Linux distribution.
And now we are trying to communicate with other Linux distribution security teams.
- [debian][DSA 3956-1] connman security update
  https://www.debian.org/security/2017/dsa-3956
- [yocto]connman: Fix for CVE-2017-12865
  http://git.yoctoproject.org/cgit/cgit.cgi/poky/commit/?id=9086b525dd00f482ea68a384540cd30778413c9e

If it would be worth posting, could you please deal with it.

Best regards,

------------------------------------------------------------
Daisuke Noguchi
Seinor Security Consultant
NRI Secure Technologies, Ltd. Cyber Security Technical Development Department
Tokyo Office   TEL +81-3-6831-8514 Fax +81-3-6706-0599



----------------------------------------------------------------
.$B$3$N%a!<%k$O!"K\Mh$N08@...J}$N$_$K8BDj$5$l$?5!L)>pJs$,4^$^$l$F$$.(B
.$B$k>l9g$,$4$6$$$^$9!#$*?4$"$?$j$N$J$$>l9g$O!"Aw?.<T$K$4O"Mm$N$&$(!".(B
.$B$3$N%a!<%k$r:o=|$$$?$@...^$9$h$&$*4j$$?=$7>e$2$^$9!#.(B

PLEASE READ :This e-mail is confidential and intended for the
named recipient only. If you are not an intended recipient,
please notify the sender and delete this e-mail.
----------------------------------------------------------------

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ