Date: Tue, 11 Oct 2011 21:23:11 +0200 From: Petr Matousek <pmatouse@...hat.com> To: oss-security@...ts.openwall.com Cc: cve-assign@...re.org, Peter.Huewe@...ineon.com, srajiv@...ux.vnet.ibm.com, eteo@...hat.com Subject: Please REJECT CVE-2011-1161 Patch for this CVE in its original form tried to limit TPM_PARAMSIZE to the userspace buffer size. While this is still an unsolved problem (because of the patch changes), with patches for CVE-2011-1160 and CVE-2011-1162 applied this is a security hardening not a security flaw. Please reject this as a dupe of CVE-2011-1160 and/or CVE-2011-1162. References: https://github.com/torvalds/linux/commit/6b07d30a https://bugzilla.redhat.com/show_bug.cgi?id=732629#c13 http://sourceforge.net/mailarchive/forum.php?thread_name=CAGyNYUPLbujZm0hq9rfBgXk-xw_xm1ofhe59yNkqEupdt5fUrg%40mail.gmail.com&forum_name=tpmdd-devel Thank you, -- Petr Matousek / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.