Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sun, 06 Jan 2013 10:41:16 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Henri Salo <henri@...v.fi>, jannhorn@...glemail.com
Subject: Re: CVE request: mount/umount leak information about
 existence of folders

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 01/06/2013 03:38 AM, Henri Salo wrote:
> Hello,
> 
> Please assign CVE identifier for mount/umount information leak
> about existence of folders. Reported in Debian bug
> http://bugs.debian.org/697464
> 
> - Henri Salo
> 

Tested and confirmed on various versions. Please use CVE-2013-0157 for
this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=J8Fe
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.