Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 25 Nov 2015 20:14:56 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: David Jorm <david.jorm@...il.com>
Cc: oss-security <oss-security@...ts.openwall.com>, CVE ID Requests <cve-assign@...re.org>
Subject: Re: CVE request: DoS in ONOS when handling jumbo ethernet frames

On Tue, Nov 24, 2015 at 10:19 AM, David Jorm <david.jorm@...il.com> wrote:

> It was found that ONOS would throw exceptions when handling jumbo ethernet
> frames. The exceptions were not caught and handled, so a remote
> unauthenticated attacker could use this flaw to perform a denial-of-service
> attack against an ONOS system.
>
> To exploit this issue, the attacker must be able to send a jumbo ethernet
> frame to a switch controlled by ONOS. Only the connection between the
> controller and the switch generating the packet-in message of the malicious
> packet will be affected (disconnected). More details are available here:
>
> https://jira.onosproject.org/browse/ONOS-3349
>
> An advisory is now live with no CVE ID:
>
> https://wiki.onosproject.org/display/ONOS/Security+advisories
>
> Please assign a CVE ID to this issue. A request was sent to MITRE
> directly 9 days ago with no answer. We need a CVE ID within the next 24
> hours.
>
> Thanks
> David Jorm on behalf of the ONOS security response team
>

Adding Mitre to CC to make sure we don't end up with a duplicate.

Please use CVE-2015-7516 for this issue. Happy Thanksgiving all!

--
Kurt Seifried -- Red Hat -- Product Security -- Cloud
PGP A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
Red Hat Product Security contact: secalert@...hat.com

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.