Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20130422164620.GA7143@kroah.com>
Date: Mon, 22 Apr 2013 09:46:20 -0700
From: Greg KH <greg@...ah.com>
To: oss-security@...ts.openwall.com
Cc: cve-assign@...re.org
Subject: Re: Re: Linux kernel: more net info leak fixes for
 v3.9

On Mon, Apr 22, 2013 at 01:44:17AM -0400, cve-assign@...re.org wrote:
> 680d04e0ba7e926233e3b9cee59125ce181f66ba CVE-2013-3236
> d5e0d0f607a7a029c6563a0470d88255c89a8d11 CVE-2013-3237

Please explain how these can get a CVE number when the code involved has
never even been in a kernel.org release yet?

confused,

greg k-h

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.