|
Message-ID: <209aa35a-1730-012b-7dc9-cdd700d5598c@suse.com>
Date: Wed, 17 Mar 2021 13:12:38 +0100
From: Wolfgang Frisch <wolfgang.frisch@...e.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE-2021-3428 Linux kernel: integer overflow in
ext4_es_cache_extent
On 17/03/2021 11.11, Greg KH wrote:
> Are you sure that SUSE didn't already assign one to this?
>
> And if not, why not
I chose not to assign a CVE after consulting with security@...nel.org
and proceeded to handle the issue as a regular bug. Local denial of
service bugs that require specially crafted file systems and the
elevated privileges required to mount them, are generally not considered
security issues worthy of CVEs by the kernel community. It's a
borderline case but I have no issues with this new CVE assignment.
Best regards,
Wolfgang
--
Wolfgang Frisch <wolfgang.frisch@...e.com>
Security Engineer
OpenPGP fingerprint: A2E6 B7D4 53E9 544F BC13 D26B D9B3 56BD 4D4A 2D15
SUSE Software Solutions Germany GmbH
Maxfeldstr. 5, 90409 Nuremberg, Germany
(HRB 36809, AG Nürnberg)
Managing Director: Felix Imendörffer
Download attachment "OpenPGP_signature" of type "application/pgp-signature" (841 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.