Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 20 Apr 2015 12:22:48 -0400 (EDT)
From: cve-assign@...re.org
To: jann@...jh.net
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: Linux: chown() was racy relative to execve() - Linux kernel

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8b01fc86b9f425899f8a3a8fc1c47d73c2c20543

Use CVE-2015-3339.


> Two programs for which this could be relevant are procmail and vsftpd.

If the procmail vendor or the vsftpd vendor decides to announce a
required security update to make their product safe on affected Linux
versions (i.e., possibly some type of workaround in their code), then
that vendor should have its own CVE ID for its own product.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJVNScmAAoJEKllVAevmvmsqekIAJ7/XIgShCbUKsG6+NnmoQAh
b+EW9BhPxjoqhgHHr2ItFgXY9Dfh1qWUlorpM9EPNdphuMVsUZWs/nwGNvNvLFfy
rPlHt1v2lmg+pKNnqrC4QcfLfRYa2iAVFqk9GO81PW4Jq4GCkKYnL08oOXaW1pSa
Hu9GYu56jp8GQinKbn3vX+MYmwwUy1gsSbB3AN2jM6QbGBldcctZFKzcfy5rJ3Cj
2ukvi3j15fZr8JTMoPtc8IocGZmGG/FuDNzo6sQp9ZFV9vyCnGpuRUVXECOCDk++
rD/Y+VQD3YBvrwLOFdqE9ILVCc6HZJUghoj7THW7T//Ugzk8N68jCwxPdcgZ6+g=
=7cGX
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ