Date: Wed, 17 Mar 2021 13:12:38 +0100 From: Wolfgang Frisch <wolfgang.frisch@...e.com> To: oss-security@...ts.openwall.com Subject: Re: CVE-2021-3428 Linux kernel: integer overflow in ext4_es_cache_extent On 17/03/2021 11.11, Greg KH wrote: > Are you sure that SUSE didn't already assign one to this? > > And if not, why not I chose not to assign a CVE after consulting with security@...nel.org and proceeded to handle the issue as a regular bug. Local denial of service bugs that require specially crafted file systems and the elevated privileges required to mount them, are generally not considered security issues worthy of CVEs by the kernel community. It's a borderline case but I have no issues with this new CVE assignment. Best regards, Wolfgang -- Wolfgang Frisch <wolfgang.frisch@...e.com> Security Engineer OpenPGP fingerprint: A2E6 B7D4 53E9 544F BC13 D26B D9B3 56BD 4D4A 2D15 SUSE Software Solutions Germany GmbH Maxfeldstr. 5, 90409 Nuremberg, Germany (HRB 36809, AG Nürnberg) Managing Director: Felix Imendörffer Download attachment "OpenPGP_signature" of type "application/pgp-signature" (841 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.