Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 16 Dec 2015 10:30:19 -0500 (EST)
From: cve-assign@...re.org
To: meissner@...e.de
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request: Linux Kernel: information leak from getsockname

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> Could we merge them with this CVE?
> 
> http://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=5233252fce714053f0151680933571a2da9cbfb4
> 
> in bluetooth/sco

No, we assign a new ID for a similar issue that is separately discovered.
Use CVE-2015-8575 for this sco_sock_bind issue.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCAAGBQJWcYM3AAoJEL54rhJi8gl5b0MP/iNeJVjRm3mO+t1zcZMLJUQr
sRf3XySNu8vBcfK59FgmHJ2PVOSscPuS557qHvJMAOVQ6smmF/9jl58uRbyl4WYh
41wHTsQJBlyuRiSfzy2fowdoTPGKMqJyRatsvXbaJk3TB86lOK58tDOCcgqMYk0i
mhW7YXAcpS4Kt3bpuwCBHKFUKHDUHPYDtR3QFZeERYYusWL8nwfnrd0LBBw2qAg5
xCDT8s+DCxXTeE4Wr8zGMq8+QHI9yUf/jveqo8xCu7ur0TEqM98nKZ6mX2rtoVGt
DvoFX3G4DOz4++ForUQgcLefyLW/T1f9zwj0OrHXzLeTeAyZpwFS2fQ9pZCG8frR
1qJPvIjWzGcu8ojR5whSNbQdKwDdaz0gaBBEvPvL083t5TGQxgseTlZHvcfVdxWD
x4KGNG8GtUgwJ7HXvWGejOPEkgAcxblnzSTOZsmi35AIze5whfWDGnl1a6EGelgt
LPn5d3XGjZC7smLUxVrai0ENHhBuaG1KHRuTbaS+NR1YcE56Bg7ikMvWt7Twgyqz
LeuGoNwQqwuSs38+CSI3pmpFVph2AN7z6gxWug7sN4nuQzhV9s9nJat4TSsQt7lp
RN4kTepa6vcxPVPBa0khOpAOWtfBUhPwbuXB+TTQjWslf54e+fNlIErZGLDf/F6r
cLpJcVHqqM6Jm20eusPc
=akG6
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.