Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 20 Feb 2014 12:44:28 -0500 (EST)
From: cve-assign@...re.org
To: ppandit@...hat.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request: Linux kernel: s390: crash due to linkage stack instruction

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> Linux kernel built for the s390 architecture(CONFIG_S390) is vulnerable to a
> crash due to low-address protection exception.

> https://git.kernel.org/linus/8d7f6690cedb83456edd41c9bd583783f0703bf0

Use CVE-2014-2039.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTBj1tAAoJEKllVAevmvmso2AIAMEt7q6Jqm21PZYKFzZV9Jh3
qZSbK6pN65y6V5CrrtlrlW0C3apOUMN+6LPS+F58cLkBjYOB4d16ERGtbutY8v2G
ntuxY2YB7zt4kShDOqN5crGaEWO3G0MUxvOxYlH+OZIPqxHWlq7U4LC6FyEQ9qfH
4CZCDuI5L9LGRyQb/g17cjFf6JcC1ogCJbFFTadGgGCSo+cv1YaAoa3ModFsM8x1
YB0H286wpMhsPvAVXxniDATc7Ib7EDLhD4rXqlTZsyvuQHx3jDEUvkly03rx1b1l
p6BaWOlSEXmH6gU1jd6iKwIOclTYFrYCEa7yGknH0227/OhNjpVOIlK6FE9c2Xo=
=UXcC
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.