Date: Mon, 16 Mar 2015 13:16:22 +0530 (IST) From: P J P <ppandit@...hat.com> To: oss security list <oss-security@...ts.openwall.com> Subject: Re: CVE request: Linux kernel: tty: kobject reference leakage in tty_open -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hello Greg, +-- On Fri, 13 Mar 2015, Greg KH wrote --+ | > -> https://git.kernel.org/linus/c290f8358acaeffd8e0c551ddcc24d1206143376 | Digging up patches from 2011? Why? Not digging up old patches, the issue was brought to our attention as RHEL-6 is affected. | What does asking for a CVE for such an old issue help with? Well, it helps in tracking the issue for later and letting wider audience know about it. As there could be other distributions that are affected by it. Thank you. - -- Prasad J Pandit / Red Hat Product Security Team 47AF CE69 3A90 54AA 9045 1053 DD13 3D32 FE5B 041F -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJVBopOAAoJEN0TPTL+WwQfAsEQALBf/noehwQwzVH/9jrcc0un hRwBWvNCzOGuvAuZDb25v6mxd3adLYgz4FKQ89D0jDhAqmpf3M2nYhn7nVyT/JoO 2nwyfqQp0k1dnGpLvCGDNi99BcP50thU23AbtOolyWYopEopcXqcCUCJkVfCj5N+ ZANUE1pjIh/kPUEgCpKzbDgmrweC0ctjAzDlv57qPwUBXeFWbXt4HhQuAtxEoW3x VnNwgVNR3fSe67cBQ5ah/BKjRoQkHJZUjaOeVCBtrE2XtHVxLeUcRng3oxoHdP+z lxaCiBjBrbN+lrmsVM+OLDC73e97vnM2K35CGfIrKk7xiu2K8MaIPEMUnQ3E7AUR DQiJXuweLeIroYA0DVVa97dIdmxokHxdL4PuW3fDQ/4DaU6LTjzvocJbyWZudNOe hTn4lD2VwBvLiNB5tqdc55dbPs3KrjxopV7db3yY4IesDsSfuA89ndQYMHkT6wcE Mx3bYnF1CfnrdcLI35ZK7RMaDKgaKn3RUVb5/BguAven/gas8ntorojwaW6lLc2E Hm50/BeZNZRgs6kh48V3fdOWmlnjBgV1oY5X4hUv4NUFIXhUjtfGFgyr1Y9mdQ4V pYL3r9t0Wc1ptsglIYLbcEzKD0hrrjTOsv0k5egVPcL3ku2n2iSQB2WMcx2aKVwl FJ8ltd4qcSa+mhBrNamD =hyMr -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.