Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat, 16 Jul 2016 19:14:58 +0000
From: Jesse Hertz <>
To: "" <>
CC: "" <>
Subject: Re: Multiple Bugs in OpenBSD Kernel 

Hi, can you please assign CVE’s for the issues mentioned.
> On Jul 14, 2016, at 5:23 PM, Jesse Hertz <> wrote:
> It appears that me using HTML emails may have made the attachments unreadable on the web interface or for some users. Apologies. Here are the attachments again in a plaintext email.
> I would also like to note (thanks to tj@...nbsd for pointing this out!) that with regard to the bugs requiring kern.usermount:
> “these bugs are now root-only in -current since the kern.usermount option
> was disabled and will be removed entirely. may be worth a mention on your
> write-up.”
> <kevent_panic.c><mmap_panic.c><mount_panic.c><thrsigdivert_panic.c><thrsleep_panic.c><tmpfs_mknod_panic.c><ufs_getdents_panic.c><unmount_panic.c>

Download attachment "signature.asc" of type "application/pgp-signature" (497 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ