Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 15 Oct 2015 12:39:44 -0700
From: Blibbet <>
Subject: Re: Re: CVE Request - Linux kernel -
 securelevel/secureboot bypass.

On 10/15/2015 09:58 AM, wrote:
> As far as we can tell, you are reporting an issue in functionality
> that was developed for a Red Hat product. Because identical
> functionality is not currently offered elsewhere, a CVE ID can be
> assigned without considering the details of the securelevel behavior
> that may later be implemented (or considered optimal) outside of Red
> Hat.

I haven't seen Red Hat's new patch yet, but does this count? It sounds
like similar functionality, at least.

More URLs here:


Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ