Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1A3BE2DB-669B-4519-B07B-F1F51C5BA6D5@nccgroup.trust>
Date: Sat, 16 Jul 2016 19:14:58 +0000
From: Jesse Hertz <Jesse.Hertz@...group.trust>
To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com>
CC: "cve-assign@...re.org" <cve-assign@...re.org>
Subject: Re: Multiple Bugs in OpenBSD Kernel 

Hi, can you please assign CVE’s for the issues mentioned.
> On Jul 14, 2016, at 5:23 PM, Jesse Hertz <Jesse.Hertz@...group.trust> wrote:
> 
> It appears that me using HTML emails may have made the attachments unreadable on the web interface or for some users. Apologies. Here are the attachments again in a plaintext email.
> 
> I would also like to note (thanks to tj@...nbsd for pointing this out!) that with regard to the bugs requiring kern.usermount:
> 
> “these bugs are now root-only in -current since the kern.usermount option
> was disabled and will be removed entirely. may be worth a mention on your
> write-up. https://marc.info/?l=openbsd-cvs&m=146851081629533&w=2”
> 
> 
> <kevent_panic.c><mmap_panic.c><mount_panic.c><thrsigdivert_panic.c><thrsleep_panic.c><tmpfs_mknod_panic.c><ufs_getdents_panic.c><unmount_panic.c>


Download attachment "signature.asc" of type "application/pgp-signature" (497 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.