Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 16 Mar 2015 13:16:22 +0530 (IST)
From: P J P <ppandit@...hat.com>
To: oss security list <oss-security@...ts.openwall.com>
Subject: Re: CVE request: Linux kernel: tty: kobject reference
 leakage in tty_open

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

   Hello Greg,

+-- On Fri, 13 Mar 2015, Greg KH wrote --+
| >    -> https://git.kernel.org/linus/c290f8358acaeffd8e0c551ddcc24d1206143376
| Digging up patches from 2011?  Why?

  Not digging up old patches, the issue was brought to our attention as RHEL-6 
is affected.

| What does asking for a CVE for such an old issue help with?

  Well, it helps in tracking the issue for later and letting wider audience 
know about it. As there could be other distributions that are affected by it.

Thank you.
- --
Prasad J Pandit / Red Hat Product Security Team
47AF CE69 3A90 54AA 9045 1053 DD13 3D32 FE5B 041F

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=hyMr
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.