Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <209aa35a-1730-012b-7dc9-cdd700d5598c@suse.com>
Date: Wed, 17 Mar 2021 13:12:38 +0100
From: Wolfgang Frisch <wolfgang.frisch@...e.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE-2021-3428 Linux kernel: integer overflow in
 ext4_es_cache_extent

On 17/03/2021 11.11, Greg KH wrote:
> Are you sure that SUSE didn't already assign one to this?
> 
> And if not, why not

I chose not to assign a CVE after consulting with security@...nel.org 
and proceeded to handle the issue as a regular bug. Local denial of 
service bugs that require specially crafted file systems and the 
elevated privileges required to mount them, are generally not considered 
security issues worthy of CVEs by the kernel community. It's a 
borderline case but I have no issues with this new CVE assignment.

Best regards,
Wolfgang


-- 
Wolfgang Frisch <wolfgang.frisch@...e.com>
Security Engineer
OpenPGP fingerprint: A2E6 B7D4 53E9 544F BC13  D26B D9B3 56BD 4D4A 2D15
SUSE Software Solutions Germany GmbH
Maxfeldstr. 5, 90409 Nuremberg, Germany
(HRB 36809, AG Nürnberg)
Managing Director: Felix Imendörffer



Download attachment "OpenPGP_signature" of type "application/pgp-signature" (841 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.