Date: Fri, 12 Jun 2015 14:46:57 -0400 From: Colin Walters <walters@...bum.org> To: cve-assign@...re.org Cc: oss-security@...ts.openwall.com, Miloslav Trmač <mitr@...hat.com> Subject: Re: CVE request for polkit -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Hi, On Mon, Jun 8, 2015, at 04:06 PM, Colin Walters wrote: > > > For purposes of CVE, we may be able to model this as a situation in > > which the (realistically exploitable) counter wraparound is a clear > > implementation error and can have a CVE ID, I'm sure you're busy and I don't want to bother too much, but is there an approximate time by which we could expect a CVE assignment? We'd like to get an update out relatively soon, since the issue is public. Is there any more information needed from us? Thanks in advance for the help (and maintaining a very critical service!) -----BEGIN PGP SIGNATURE----- iQEcBAEBCgAGBQJVeykdAAoJENxF/VkhwT8LZ/YH/1ibT5eSOOzEpxtUO9gJgov3 YSJcpzXGbiBetS2oKBjGLbljwuwwLNS8dOaC+n/yomfmWhB9IpFgRHfmpW0P5TpA QsjrOMiOHY64rXsTDatqxJLUvVWcjdubS+9NSd70Wl5EwwQm7Wd1/Ja09VeFvs3a zsZE8nq8P4Lr77ZssW1CG3ja2BCxaOtm7cmdPyuVmlVQWog0KVI2ItPNWMG/qBs1 egegU7XHCG5dtie8agoRDPZJSMczIuDFOgC1LoD+QKcFi5Ne58Jo85NkD8vWViQ6 GWDs9jbEzLtrCT37aNLP/crZvyaSJYuTPaxSvgWqpaHt3ipCBSPHY3s44qTpP6w= =FHHB -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ