Date: Tue, 1 Mar 2016 17:11:55 +0100 From: Salvatore Bonaccorso <carnil@...ian.org> To: OSS Security Mailinglist <oss-security@...ts.openwall.com> Cc: Ben Hutchings <benh@...ian.org> Subject: CVE Request: Linux: aio write triggers integer overflow in some network protocols Hi We would like to request a CVE for the following issue in the Linux kernel: https://git.kernel.org/linus/4c185ce06dca14f5cea192f5a2c981ef50663f2b (v4.1-rc1) For the linux-stable: https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit?id=c4f4b82694fe48b02f7a881a1797131a6dad1364 For an upcoming Linux DSA in Debian we would use something like: > Ben Hawkes of Google Project Zero reported that the AIO interface > permitted reading or writing 2 GiB of data or more in a single > chunk, which could lead to an integer overflow when applied to > certain filesystems, socket or device types. The full security > impact has not been evaluated. The issue was initially already addressed via https://git.kernel.org/linus/a70b52ec1aaeaf60f4739edb1b422827cb6f3893 (v3.5-rc1) but then opened again due to https://git.kernel.org/linus/41ef4eb8eef8d06bc1399e7b00c940d771554711 (v3.10-rc1) Can you please assign a CVE id for this issue? Regards, Salvatore
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.