|
Message-Id: <20150420162248.9249E3321E6@smtpvbsrv1.mitre.org> Date: Mon, 20 Apr 2015 12:22:48 -0400 (EDT) From: cve-assign@...re.org To: jann@...jh.net Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: Linux: chown() was racy relative to execve() - Linux kernel -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8b01fc86b9f425899f8a3a8fc1c47d73c2c20543 Use CVE-2015-3339. > Two programs for which this could be relevant are procmail and vsftpd. If the procmail vendor or the vsftpd vendor decides to announce a required security update to make their product safe on affected Linux versions (i.e., possibly some type of workaround in their code), then that vendor should have its own CVE ID for its own product. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJVNScmAAoJEKllVAevmvmsqekIAJ7/XIgShCbUKsG6+NnmoQAh b+EW9BhPxjoqhgHHr2ItFgXY9Dfh1qWUlorpM9EPNdphuMVsUZWs/nwGNvNvLFfy rPlHt1v2lmg+pKNnqrC4QcfLfRYa2iAVFqk9GO81PW4Jq4GCkKYnL08oOXaW1pSa Hu9GYu56jp8GQinKbn3vX+MYmwwUy1gsSbB3AN2jM6QbGBldcctZFKzcfy5rJ3Cj 2ukvi3j15fZr8JTMoPtc8IocGZmGG/FuDNzo6sQp9ZFV9vyCnGpuRUVXECOCDk++ rD/Y+VQD3YBvrwLOFdqE9ILVCc6HZJUghoj7THW7T//Ugzk8N68jCwxPdcgZ6+g= =7cGX -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.