Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Tue,  6 Jan 2015 12:59:17 -0500 (EST)
From: cve-assign@...re.org
To: oss-security@...ts.openwall.com
Cc: cve-assign@...re.org
Subject: CVE-2014-9529 - Linux kernel security/keys/gc.c race condition

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

CVE-2014-9529 has been assigned to this issue in security/keys/gc.c
that can lead to memory corruption or a panic:

  http://marc.info/?l=linux-kernel&m=141986398232547&w=2
  http://marc.info/?l=linux-kernel&m=142047362307894&w=2

(not yet available at
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/log/security/keys/gc.c)

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJUrCFRAAoJEKllVAevmvmsyA4IAIh+kbncaMb8/okcoRBwCGuc
3u9QyifANmAxp3AErN/JzrEi1mWfQ/1dI+XMucINM5+4ddOpLoPsr2B1Vt7EYiAN
O47FfVodTvEsKYRqkbXXidfVjl8lU8WiQa6PA5mdzf8eSv88wIJqHXqwQUx9YCVS
K7/FJEjhC4c0lkDG4oTlrPuTOjNgdXSM5qlgkwp5F6im1GWN9t3ckfYq5OXL11a4
dZ52i5v5N0SHwy0skfhVndql6Q/Y5tTfYfY6+QIALZ/58vUGqyt6k47RpNsilLSE
grkjJjSwI4ySj7HO1R4K8lpCiUWPLK8qMMS1D42Fb5fQ7aVjeb9xhWO1r3iMLbI=
=PoZ+
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.