|
Message-ID: <90cda9c173e44ef5a56478ba116836fb@imshyb02.MITRE.ORG> Date: Mon, 28 Nov 2016 03:49:09 -0500 From: <cve-assign@...re.org> To: <jmm@...ian.org> CC: <cve-assign@...re.org>, <oss-security@...ts.openwall.com> Subject: Re: kernel: fix minor infoleak in get_user_ex() -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 > the LWN comment by Brad Spengler referenced above refers to a new issue > which affected some Linux stable lines, which backported > 1c109fabbd51863475cd12ac206bdd249aee35af without also backporting > 548acf19234dbda5a52d5a8e7e205af46e9da840. > > So please assign a second CVE ID for the latter. https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9644 - -- CVE Assignment Team M/S M300, 202 Burlington Road, Bedford, MA 01730 USA [ A PGP key is available for encrypted communications at http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJYO+8OAAoJEHb/MwWLVhi2VwkQALNPfR4xU0r/4dKHpFtFppMX aKkVEdoR/rYXp84ph/QSRnrBisv5s4z8uaCSAEhL3eMUSzqPFkkvDR8jPOWYVMw4 tHp42FztwVEZl43CNQojS3oRQ5VpX3IRQOlq3Ojcsq9Lcovze8hnGyEE7ZWuHqbd xKF6SbTiLsmlzI6UFsVfwC9+GEEPwoBG4WWOxQr5Ryn8x+EWwp/YMZpGHhkvwcTC Whi43J5uyvQOP5WuDv4IwvjsuOIxrpXW+uvuxflasf9QuYV0dEk3ZPPhr+TkQ9PN mSA9gwqmIh+bShrmy8T+ir0YTZppx3grEJQplxUGIFXqYxBJS8iykoln0XWLnhih XGfWKBx44UuoARuGfU7cJ7+KWycsWNWx0LuaK54PM+tPCcAwJtbP+AtZndYH9gLY 5CG8rlQwBQkIZbPXo2a/CYx55s5CAevClaJwPTNduwbA5+8Umy1qtAKYaSoK6auL dDvwEuQtDo5PPOB/TlDdgv+/wsbe5HerI6yltL9l18zjomG6Qpyw3RVnbI/m4QGB 90Nw6QUw13tGnQZIGQq9BqQQlwH1uSRg2I6vSA4yidJAzX1R6b28N0ZZ84TLBf2W fiH8mNoKR/nolU5RRvt7sE8bIVAkOxLI6zbevx4hE7aiHa6y7ASU2i9Ur+yQidjk eFPK2b2Ws14fGAsEbAsQ =xE31 -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.