Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed,  3 Jun 2015 14:00:12 -0400 (EDT)
From: cve-assign@...re.org
To: ppandit@...hat.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request Linux kernel: fs: udf kernel oops

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> Linux kernel built with the UDF file system(CONFIG_UDF_FS) support is
> vulnerable to a crash. It could occur while fetching inode information from a
> corrupted/malicious udf file system image.
> 
> An unprivileged user could use this flaw to crash the kernel resulting in
> DoS.
> 
> Upstream fix:
> -------------
>    -> https://git.kernel.org/linus/23b133bdc452aa441fcb9b82cbf6dd05cfd342d0

Use CVE-2015-4167.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJVb0ADAAoJEKllVAevmvmsCSsH/2ZYDG3UthdGtOXwzVL4Uzbf
g+jL3ZhDq0qtH8SmsPEVH2nnls70vsc9DBuUbcz1ubNUchHubu/oqO4NNEavRdu8
ODzC5/ghXaoR5PLVKdxw+32klhBUJZoTi/ALtnl4J3Z78ZQVks01ibI3q47+zjbh
RbPo4wrE3iDvvR42qTJL4yi5U3Z4SIXOetbpv3i/4/onO5ePKjnnUhlVPNd9s2ll
GSkO3CmHJT+3KuNMpKRNYoTfsFrHO2tCFdACrktkYQT+RYU/XBmVRXljX8j//+cs
h+HEyGJ8pwOgm0UMSzoRam9SyeerYAn65ELSAD7w2ATjlknNiwEyAa4DufLRSQs=
=b1Lv
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.