Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 24 May 2012 22:11:09 -0600
From: Vincent Danen <>
To: "Steven M. Christey" <>
Cc: Kurt Seifried <>,
Subject: CVE-2011-2906 should have been rejected (kernel non-security issue)

Hi, Steve.  Just a friendly heads-up on what came through CVENEW today:

> Name: CVE-2011-2906 (kernel)
> Status: Candidate
> URL: [Open
> URL]
> Final-Decision:
> Interim-Decision:
> Modified:
> Proposed:
> Assigned: 20110727
> Category:
> Reference: MLIST:[oss-security] 20110810 Re: CVE requests: Two kernel
> issues
> Reference: URL:
> [Open URL]
> Reference:
> [Open URL]
> 2.6.git;a=commit;h=b5b515445f4f5a905c5dd27e6e682868ccd6c09d
> Reference:
> [Open URL]
> Reference:
> [Open URL]
> Integer signedness error in the pmcraid_ioctl_passthrough function in
> drivers/scsi/pmcraid.c in the Linux kernel before 3.1 allows local
> users to cause a denial of service (memory consumption or memory
> corruption) via a negative size value in an ioctl call.

This should be rejected as per the message two responses after the first
reference above:

where Eugene says, based on the "this isn't a security flaw" message
from Dan Rosenberg.

Can you add a "REJECT" or "DISPUTED" note or whatever?  This probably
should have never been written up.


Vincent Danen / Red Hat Security Response Team 

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.