Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20170821160856.y3ewehenfowokfot@f195.suse.de>
Date: Mon, 21 Aug 2017 18:08:56 +0200
From: Matthias Gerstner <mgerstner@...e.de>
To: oss-security@...ts.openwall.com
Subject: Re: tcmu-runner: multiple vulnerabilities in
 tcmu-runner daemon allowing local DoS, information leak and a memory leak

> > ------------------------------------------------------------------------
> > qcow handler opens up an information leak via the CheckConfig D-Bus
> > method
> > ------------------------------------------------------------------------
> [...]
> >   https://github.com/open-iscsi/tcmu-runner/commit/8cf8208775022301adaa59c240bb7f93742d1329
> 
> CVE-2017-1000190

Sorry, made a mistake here. This is CVE-2017-1000199.

Download attachment "signature.asc" of type "application/pgp-signature" (820 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.