Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 29 May 2014 02:59:33 -0400 (EDT)
From: cve-assign@...re.org
To: luto@...capital.net
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request: Linux kernel DoS with syscall auditing

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Use CVE-2014-3917 for the specific issue that would be fixed by the
http://article.gmane.org/gmane.linux.kernel/1713179 patch. We realize
that the eventual code changes might not include something exactly
equivalent to this. At least at the moment, there are no CVE IDs for
other issues listed in the
http://article.gmane.org/gmane.linux.kernel/1713180 post. Similarly,
there is no CVE ID for the higher-level concept that "config
AUDITSYSCALL" existed but was not marked BROKEN.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJThtj0AAoJEKllVAevmvmstBkIAKgjg+yIdWyduj6vqZfTs77L
PgviyMmvZN/SWLmcJa3qXrNhsQVC8sk1jSYX5BLeXuu1YjJM7kkUJHpfmTn4HcfK
YINrXyqEAC5O7jLAnsuPfKOWFPUZRFTqs1t/X8NfqfEvawCMw8kgr8O1Vs7ynkyu
dEOnIMuPGSW/b6CIHlD10mLpdoJNy6mmBLQU6XOZajfYhXScdGKJNpMyIrjW1J34
GUt8qFHwyCgpTQbX1YeVgevSJvjQVjdsrUNWqmmalbAUyU5lS85Uq4kL3IdtsMFO
zDMsgfo+YJFsxwrHtu9EYCXQBiLcpJPS3ZxgcGgureSM8/CrnF02dJ3C7XBtD6A=
=ewfF
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ