Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat, 16 Jul 2016 19:14:58 +0000
From: Jesse Hertz <Jesse.Hertz@...group.trust>
To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com>
CC: "cve-assign@...re.org" <cve-assign@...re.org>
Subject: Re: Multiple Bugs in OpenBSD Kernel 

Hi, can you please assign CVE’s for the issues mentioned.
> On Jul 14, 2016, at 5:23 PM, Jesse Hertz <Jesse.Hertz@...group.trust> wrote:
> 
> It appears that me using HTML emails may have made the attachments unreadable on the web interface or for some users. Apologies. Here are the attachments again in a plaintext email.
> 
> I would also like to note (thanks to tj@...nbsd for pointing this out!) that with regard to the bugs requiring kern.usermount:
> 
> “these bugs are now root-only in -current since the kern.usermount option
> was disabled and will be removed entirely. may be worth a mention on your
> write-up. https://marc.info/?l=openbsd-cvs&m=146851081629533&w=2”
> 
> 
> <kevent_panic.c><mmap_panic.c><mount_panic.c><thrsigdivert_panic.c><thrsleep_panic.c><tmpfs_mknod_panic.c><ufs_getdents_panic.c><unmount_panic.c>


Download attachment "signature.asc" of type "application/pgp-signature" (497 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ