|
Message-Id: <20151029060249.95D1DB2E06C@smtpvbsrv1.mitre.org> Date: Thu, 29 Oct 2015 02:02:49 -0400 (EDT) From: cve-assign@...re.org To: sd@...asysnail.net Cc: cve-assign@...re.org, oss-security@...ts.openwall.com, hannes@...essinduktion.org Subject: Re: CVE Request: Linux kernel: Buffer overflow when copying data from skbuff to userspace -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 > http://patchwork.ozlabs.org/patch/530642/ > skb_copy_and_csum_datagram_iovec doesn't check the actual length of > the iovec's buffers to which it copies data Use CVE-2015-8019. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJWMbWOAAoJEL54rhJi8gl5u2IP/1uwOebEBEyOnCiDcG7jxdpz SxgyYUaFHY0H3pflkKV87ycIlygAU2yGt1mxPU8LEZvA7gi7RBNOxG1+T4ntMblw 0rUvWz3TNW1ccUQXs/QjKRD+x9KYJxeC835qkXCX/oL3gmP9+J2+lX3blW6L7Qr8 n5U/XI+a+kbPZyMjOvtMOGtEtorDV1yw4duONre6x6VjRJ5i0M812oumuemYFgn3 LM38GZu3n7KXI7Rk0nNbraJ3NktJbVf7wTezuRGLCVRJY52dLRf+Y7Ne54KIwPt3 pHONuWYdk/L9SvQDVRUT8r04M0k5Zl8xfSSwiXbsxal9vHopScnkLv3/IUVYgU7f H5YCVIkkJxb48rXdN9XIjp7YXxXoRl/I52cmEizW8a5+rlK7T+1wUpoVV0CzPTHM 7Q4Yu2UE0bFMkqxcd9OnW04AWUrWV+higjKe+rLx/N+7jdpO/287vPUNfy6ZkYK3 B3XgRx5A25I0Bczph9NsUq/CKO/R2CGPLGIl8kMRMScrkAnNk+2tXhFKiPYXENBp Nao+vWmyhKI/kyBSX00dQOZ3pSVmFNJk11mSVYADAjbzMFBT2F0MNmWdAASxXOaf so+o5QzuNgmNzuvKkTYzLw4VcDm43WY81eRuY7JWBn+m44ymtnZ50H4vwyg07dWZ T4TXvgTe3mVfHmgC2TW1 =37OD -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.