|
Message-Id: <201405290659.s4T6xX2n021329@linus.mitre.org> Date: Thu, 29 May 2014 02:59:33 -0400 (EDT) From: cve-assign@...re.org To: luto@...capital.net Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: CVE request: Linux kernel DoS with syscall auditing -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Use CVE-2014-3917 for the specific issue that would be fixed by the http://article.gmane.org/gmane.linux.kernel/1713179 patch. We realize that the eventual code changes might not include something exactly equivalent to this. At least at the moment, there are no CVE IDs for other issues listed in the http://article.gmane.org/gmane.linux.kernel/1713180 post. Similarly, there is no CVE ID for the higher-level concept that "config AUDITSYSCALL" existed but was not marked BROKEN. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJThtj0AAoJEKllVAevmvmstBkIAKgjg+yIdWyduj6vqZfTs77L PgviyMmvZN/SWLmcJa3qXrNhsQVC8sk1jSYX5BLeXuu1YjJM7kkUJHpfmTn4HcfK YINrXyqEAC5O7jLAnsuPfKOWFPUZRFTqs1t/X8NfqfEvawCMw8kgr8O1Vs7ynkyu dEOnIMuPGSW/b6CIHlD10mLpdoJNy6mmBLQU6XOZajfYhXScdGKJNpMyIrjW1J34 GUt8qFHwyCgpTQbX1YeVgevSJvjQVjdsrUNWqmmalbAUyU5lS85Uq4kL3IdtsMFO zDMsgfo+YJFsxwrHtu9EYCXQBiLcpJPS3ZxgcGgureSM8/CrnF02dJ3C7XBtD6A= =ewfF -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.