Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 11 Feb 2010 17:14:36 -0500 (EST)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: oss-security@...ts.openwall.com
cc: "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE request - kernel: futex: Handle user space
 corruption gracefully


On Tue, 9 Feb 2010, Eugene Teo wrote:

> Upstream commit:
> http://git.kernel.org/linus/51246bfd189064079c54421507236fd2723b18f3

Use CVE-2010-0622, to be filled in later.

Also, I assigned a CVE for a futex refcount bug listed here:

http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=5ecb01cfdf96c5f465192bdb2a4fd4a61a24c6cc

Use CVE-2010-0623 for that one.

- Steve

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.