Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 4 Jun 2015 12:20:11 +0530 (IST)
From: P J P <ppandit@...hat.com>
To: oss security list <oss-security@...ts.openwall.com>
cc: cve-assign@...re.org, "Eric W. Biederman" <ebiederm@...ssion.com>
Subject: Re: Re: CVE request Linux kernel: ns: user namespaces
 panic

+-- On Wed, 3 Jun 2015, cve-assign@...re.org wrote --+
| We feel that this is best covered by two CVE IDs. The 
| cd4a40174b71acd021877341684d8bb1dc8ea4ae issue seems to be about lack of 
| state identification (i.e., the state is whether the path is mounted or 
| unmounted),

  Not sure if it'd have security implications which an end user could use or 
trigger. CC'ing upstream author Eric for any clarificaitons.

| We will send the two CVE IDs soon.

  Thank you so much.

Thank you.
--
Prasad J Pandit / Red Hat Product Security Team
47AF CE69 3A90 54AA 9045 1053 DD13 3D32 FE5B 041F

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ