Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 29 Oct 2015 02:02:49 -0400 (EDT)
From: cve-assign@...re.org
To: sd@...asysnail.net
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com, hannes@...essinduktion.org
Subject: Re: CVE Request: Linux kernel: Buffer overflow when copying data from skbuff to userspace

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> http://patchwork.ozlabs.org/patch/530642/

> skb_copy_and_csum_datagram_iovec doesn't check the actual length of
> the iovec's buffers to which it copies data

Use CVE-2015-8019.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCAAGBQJWMbWOAAoJEL54rhJi8gl5u2IP/1uwOebEBEyOnCiDcG7jxdpz
SxgyYUaFHY0H3pflkKV87ycIlygAU2yGt1mxPU8LEZvA7gi7RBNOxG1+T4ntMblw
0rUvWz3TNW1ccUQXs/QjKRD+x9KYJxeC835qkXCX/oL3gmP9+J2+lX3blW6L7Qr8
n5U/XI+a+kbPZyMjOvtMOGtEtorDV1yw4duONre6x6VjRJ5i0M812oumuemYFgn3
LM38GZu3n7KXI7Rk0nNbraJ3NktJbVf7wTezuRGLCVRJY52dLRf+Y7Ne54KIwPt3
pHONuWYdk/L9SvQDVRUT8r04M0k5Zl8xfSSwiXbsxal9vHopScnkLv3/IUVYgU7f
H5YCVIkkJxb48rXdN9XIjp7YXxXoRl/I52cmEizW8a5+rlK7T+1wUpoVV0CzPTHM
7Q4Yu2UE0bFMkqxcd9OnW04AWUrWV+higjKe+rLx/N+7jdpO/287vPUNfy6ZkYK3
B3XgRx5A25I0Bczph9NsUq/CKO/R2CGPLGIl8kMRMScrkAnNk+2tXhFKiPYXENBp
Nao+vWmyhKI/kyBSX00dQOZ3pSVmFNJk11mSVYADAjbzMFBT2F0MNmWdAASxXOaf
so+o5QzuNgmNzuvKkTYzLw4VcDm43WY81eRuY7JWBn+m44ymtnZ50H4vwyg07dWZ
T4TXvgTe3mVfHmgC2TW1
=37OD
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.