|
Message-Id: <20140915172330.1BCE1C505D4@smtptsrv1.mitre.org> Date: Mon, 15 Sep 2014 13:23:30 -0400 (EDT) From: cve-assign@...re.org To: ppandit@...hat.com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: CVE request Linux kernel: net: guard tcp_set_keepalive against crash -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > https://git.kernel.org/linus/3e10986d1d698140747fcfc2761ec9cb64c1d582 > https://bugzilla.redhat.com/show_bug.cgi?id=1141742 > A privileged user/process able to create RAW socket could use this flaw to > crash the system kernel resulting in DoS. Use CVE-2012-6657. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJUFyAGAAoJEKllVAevmvmsVrAH/2MCxNBia7m4Ly7aZPe1ixq4 mZXMDl4M2xLGrYiVMTCC9YUXP8uECdkSQwiJu2Owhzf8CYuMbZXLRLQ29/272fxh PXGM1Gw7Xz1bxj0zbmrqePqRcWJu/xFYG69USJklljdoIr3SdP7lF9tin/suCnli IfAfTk6GOIydVXqosjI7oxwr8Bqic74KON2EgrYYQ53ZApguK7rzdlZ9xoqm2p04 RVfeahLK70Zlny5vCpDBePJ78vohPXyXYXDms3hpsIozwTGWDVfSqINtw/8W1TFx J2PKLA8vhcB9ryOi2jW6Ks+OMvtlr4mmhey6w6Pv1wuejYO6IueGIlJm156nIf4= =QOzi -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.