Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 06 Jun 2012 10:44:58 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Sebastian Krahmer <krahmer@...e.de>
Subject: Re: CVE-Request: hyper-v daemon

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 06/06/2012 08:59 AM, Sebastian Krahmer wrote:
> Hi,
> 
> The hyper-v daemon fails to check origin of netlink messages. 
> Please see
> 
> https://bugzilla.novell.com/show_bug.cgi?id=761200
> 
> Can someone from the usual suspects assign a CVE? :)
> 
> thanks, Sebastian


Please use CVE-2012-2669 for this issue.


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=w5EU
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ