Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 14 Oct 2009 22:30:57 -0400 (EDT)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: "Steven M. Christey" <coley@...us.mitre.org>, Willy Tarreau <w@....eu>
Subject: Re: CVE request kernel: tcf_fill_node() infoleak due
 to typo in 9ef1d4c7


----- "Eugene Teo" <eugene@...hat.com> wrote:

> Eugene Teo wrote:
> > [...]
> >>   CVE-2005-4881 - tc_fill_qdisc()  (at least)
> > 
> > This requires http://patchwork.ozlabs.org/patch/35412/ too. There
> was a 
> > typo in the upstream commit 9ef1d4c7.
> 
> I'm not sure but perhaps this needs a new CVE name. This infoleak bug
> was introduced in 2005, but was discovered and fixed recently.
> 

I'm naming this as such:
CVE-2009-3612 incomplete fix for CVE-2005-4881

So please use CVE-2009-3612.

Sorry for the delay.

-- 
    JB

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.