Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20111222164447.GB5888@inutil.org>
Date: Thu, 22 Dec 2011 17:44:47 +0100
From: Moritz Muehlenhoff <jmm@...ian.org>
To: oss-security@...ts.openwall.com
Subject: Status of two Linux kernel issues w/o CVE assignments

Hi,
there were a two Linux-related CVE requests/discussions, which 
didn't end up in an assignment:

1: rose: Add length checks to CALL_REQUEST parsing
e0bccd315db0c2f919e7fcf9cb60db21d9986f52 in mainline

It was decided that this should be split, but without a final
resulting CVE assignment:
http://www.openwall.com/lists/oss-security/2011/04/12/1

2: /proc/$PID/{sched,schedstat} information leak
Vasiliy Kulikov of OpenWall posted a demo exploit.
http://openwall.com/lists/oss-security/2011/11/05/3

AFAICS no CVE ID was assigned to this?

Cheers,
        Moritz

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.