Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 25 Apr 2017 17:25:35 +0200
From: Andrej Nemec <anemec@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request: remote heap overflow in linux
 networking stack

Hi Jason,

Great, thanks for confirmation. Mitre already lists [1] so it seems we
are fine.

[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7477

Best Regards,

-- 
Andrej Nemec, Red Hat Product Security
3701 3214 E472 A9C3 EFBE 8A63 8904 44A1 D57B 6DDA



On 04/25/2017 03:53 PM, Jason A. Donenfeld wrote:
> Hey Andrej,
>
> I actually didn't submit this to Mitre, just to you, so I don't think
> there'll be a duplicate.
>
> Jason




[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ