Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sun,  9 Nov 2014 18:07:20 -0500 (EST)
From: cve-assign@...re.org
To: meissner@...e.de
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request: Linux kernel mac80211 plain text leak

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=338f977f4eb441e69bb9a46eaa0ac715c931a67f
> 
> mac80211: fix fragmentation code, particularly for encryption
> 
> we leak up to 8 bytes of plaintext (!) of the packet out into the air

Use CVE-2014-8709.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJUX/LCAAoJEKllVAevmvmsusoIAJ2rb0ei0y0wWc8qj/mhxyoB
NGR+h9roXElxgrG7fI1P0cTdb2FnBYiFlTHdy5Ydeegsqqbi7zftgwFyl3IUrvnZ
u88rDdlQHh+ViqjAQqm+ULfnWtFuI+PTDn2JpWB+CeWDcyQDSvztrMD45dfi46i+
nGLUNnm7XHDnxHUDZ0qy8n6DHCCzb23FlkezKR2zhzDDPsYECJPe9kmS6nxYHvpL
20n7Ktbinai37Dor2/ayfQyC/GYFTMCOKp7ZcjhUeF8wxPoEZPe3V3po2Wo2fyRX
YKgR+P6hRyFxb9iZ4EBvDWMxhbfw7M5oET9rYJaAC0pZYC0i9r+Lh425ZytR7EI=
=0dvJ
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.