Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 21 Feb 2014 00:20:36 +0530 (IST)
From: P J P <ppandit@...hat.com>
To: oss security list <oss-security@...ts.openwall.com>
cc: cve-assign@...re.org
Subject: Re: Re: CVE request: Linux kernel: nfs: information
 leakage

+-- On Thu, 20 Feb 2014, cve-assign@...re.org wrote --+
| This is definitely a problem that can have a CVE ID; use
| CVE-2014-2038.

  Thank you.
 
| is there also an opportunity for Client B to conduct a DoS attack
| against Client A (i.e., causing Client A's data to be completely lost)
| if the NFSv4 ACL on /mnt/file gives Client B APPEND_DATA access but
| not WRITE_DATA access?

  Ummn, I wonder if with only APPEND_DATA client would be able to 
delete/over-write file data. It needs to be verified.
 
| Our understanding is that you mean the "extra" bytes printed by the
| cat command, i.e.,
| 
|    0 \357 \277 \275 D 0 \357 \277 \275
| 
| are the leaked kernel memory bytes.

  Yes, that's correct.

Thank you.
--
Prasad J Pandit / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.