Date: Wed, 01 Oct 2014 14:04:36 -0400 From: Andrew Tappert <andrew@...ewerks.com> To: oss-security@...ts.openwall.com CC: Tom O'Connor <toconnor@...ewerks.com> Subject: CVE Request: linux kernel net_get_random_once bug My colleague Tom O'Connor and I have identified a security bug in the Linux kernel that results in drastically degraded randomness of IP IDs, TCP sequence numbers, and ephemeral port numbers on affected systems. The bug existed in kernel versions 3.13 and 3.14. We are posting here rather than to the private "distros" list because the bug has already been fixed. However, we don't think that the security implications of the bug have been acknowledged anywhere, and we think it needs a CVE. A full write-up on the bug is posted at http://secondlookforensics.com/ngro-linux-kernel-bug/. -- Andrew Tappert Raytheon Cyber Products http://secondlookforensics.com/ Download attachment "signature.asc" of type "application/pgp-signature" (182 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.