Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 20 Feb 2014 12:44:28 -0500 (EST)
From: cve-assign@...re.org
To: ppandit@...hat.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request: Linux kernel: s390: crash due to linkage stack instruction

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> Linux kernel built for the s390 architecture(CONFIG_S390) is vulnerable to a
> crash due to low-address protection exception.

> https://git.kernel.org/linus/8d7f6690cedb83456edd41c9bd583783f0703bf0

Use CVE-2014-2039.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTBj1tAAoJEKllVAevmvmso2AIAMEt7q6Jqm21PZYKFzZV9Jh3
qZSbK6pN65y6V5CrrtlrlW0C3apOUMN+6LPS+F58cLkBjYOB4d16ERGtbutY8v2G
ntuxY2YB7zt4kShDOqN5crGaEWO3G0MUxvOxYlH+OZIPqxHWlq7U4LC6FyEQ9qfH
4CZCDuI5L9LGRyQb/g17cjFf6JcC1ogCJbFFTadGgGCSo+cv1YaAoa3ModFsM8x1
YB0H286wpMhsPvAVXxniDATc7Ib7EDLhD4rXqlTZsyvuQHx3jDEUvkly03rx1b1l
p6BaWOlSEXmH6gU1jd6iKwIOclTYFrYCEa7yGknH0227/OhNjpVOIlK6FE9c2Xo=
=UXcC
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ