Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 12 Jun 2015 14:46:57 -0400
From: Colin Walters <walters@...bum.org>
To: cve-assign@...re.org
Cc: oss-security@...ts.openwall.com,
 Miloslav Trma─Ź <mitr@...hat.com>
Subject: Re: CVE request for polkit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512


Hi,

On Mon, Jun 8, 2015, at 04:06 PM, Colin Walters wrote:
>
> > For purposes of CVE, we may be able to model this as a situation in
> > which the (realistically exploitable) counter wraparound is a clear
> > implementation error and can have a CVE ID,

I'm sure you're busy and I don't want to bother too much, but is
there an approximate time by which we could expect a CVE assignment?
We'd like to get an update out relatively soon, since the issue is public.

Is there any more information needed from us?

Thanks in advance for the help (and maintaining a very critical service!)
-----BEGIN PGP SIGNATURE-----

iQEcBAEBCgAGBQJVeykdAAoJENxF/VkhwT8LZ/YH/1ibT5eSOOzEpxtUO9gJgov3
YSJcpzXGbiBetS2oKBjGLbljwuwwLNS8dOaC+n/yomfmWhB9IpFgRHfmpW0P5TpA
QsjrOMiOHY64rXsTDatqxJLUvVWcjdubS+9NSd70Wl5EwwQm7Wd1/Ja09VeFvs3a
zsZE8nq8P4Lr77ZssW1CG3ja2BCxaOtm7cmdPyuVmlVQWog0KVI2ItPNWMG/qBs1
egegU7XHCG5dtie8agoRDPZJSMczIuDFOgC1LoD+QKcFi5Ne58Jo85NkD8vWViQ6
GWDs9jbEzLtrCT37aNLP/crZvyaSJYuTPaxSvgWqpaHt3ipCBSPHY3s44qTpP6w=
=FHHB
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ