Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 31 Dec 2014 12:32:02 -0500 (EST)
From: cve-assign@...re.org
To: carnil@...ian.org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request: Linux: Remote crash via batman-adv module - Linux kernel

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> linux could crash when using the batman-adv module
> 
> http://thread.gmane.org/gmane.linux.network/343494
> https://bugs.debian.org/774155
> https://lists.open-mesh.org/pipermail/b.a.t.m.a.n/2014-November/012561.html
> https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5b6698b0e4a37053de35cc24ee695b98a7eb712b

Use CVE-2014-9428. The scope of this CVE ID is the problem as
described in 5b6698b0e4a37053de35cc24ee695b98a7eb712b. The scope does
not include other issues referenced in 343494, such as the
"-Wlogical-not-parentheses" issue in the
https://bugzilla.kernel.org/show_bug.cgi?id=84061 bug.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJUpDIAAAoJEKllVAevmvmsr3gH/2Zb6ldpFr002kIs5vtIUkaj
vEAtgEutH6TLh6wSqxsgg7X2/6u+l+RMbLuHiBmEQPJF34ytvkbdVwkfZoDOoHT+
yaiLoY2hgzr+NR7/cST4YP4OKmlrU7I6pI8IWrjVnOeWN9Ovc4uDbXC7lygeldpO
lt43skEZG+PHClFcmsPfC5KyocOwNyq+v4kZnpG8x6weAiRkDR+6epxlCy7Rs/Ic
Y7oRqDd17YlJbnmWnTRsKEqTWWy9vGnaYKpouOUh81SpHHbVc4aLdX8p891BXp84
9dpSEd7NPmzJEx86TmWzTy3l/+hV8LCDG9FmcIBiJ/dIq5XPFP/qpdSS6XYPqWo=
=tR0g
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.