Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed,  1 Oct 2014 23:29:07 -0400 (EDT)
From: cve-assign@...re.org
To: andrew@...ewerks.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com, toconnor@...ewerks.com
Subject: Re: CVE Request: linux kernel net_get_random_once bug

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> My colleague Tom O'Connor and I have identified a security bug in the
> Linux kernel that results in drastically degraded randomness ...
> existed in kernel versions 3.13 and 3.14
> 
> https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3d4405226d27b3a215e4d03cfa51f536244e5de7
> http://secondlookforensics.com/ngro-linux-kernel-bug/
> 
>   Part of the explanation ... is ... "this call-site will
>   get patched up at boot". But actually, it is not always
>   true that this patching occurs as expected. On affected
>   systems, the slow path (where initialization of random
>   seeds occurs) is never taken.

Use CVE-2014-7284.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJULMYEAAoJEKllVAevmvmshOwH/1wt7JjopbcMeZumZ6U3kx4J
B4y/v1qxJYqTyhLBUzL6vKlJ2cPyRxZsPJGQi60o1YDgPNP+wFgiryugbpmLf2Yw
CW6xR5ORsrMYxnOTwYX9no7e80i7zDBh0PhYw8y+fCsXFaPJOMH9DtRYcVLhQGpm
XByWCaPgDiCBcSpei1k6wLmKqjNJI9lFavI99B6aH9SQ8c0yCgA5tvbR/e9PAflQ
JRsDjeE0QND8WAaT2HfsrYjw5yxiPmHKzWMs89q4um1aFEUYSp1ye9PNr8vUlrPG
dS6JE5kcagkPhIFoH6Hb85hTTqXmor8R8JPRsrR0IsvQKFB49qPo5CJbhsEzBD0=
=pG+m
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.