oss-sec mailing list archives
Re: kernel: fix minor infoleak in get_user_ex()
From: <cve-assign () mitre org>
Date: Mon, 28 Nov 2016 03:49:09 -0500
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
the LWN comment by Brad Spengler referenced above refers to a new issue which affected some Linux stable lines, which backported 1c109fabbd51863475cd12ac206bdd249aee35af without also backporting 548acf19234dbda5a52d5a8e7e205af46e9da840. So please assign a second CVE ID for the latter.
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9644 - -- CVE Assignment Team M/S M300, 202 Burlington Road, Bedford, MA 01730 USA [ A PGP key is available for encrypted communications at http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJYO+8OAAoJEHb/MwWLVhi2VwkQALNPfR4xU0r/4dKHpFtFppMX aKkVEdoR/rYXp84ph/QSRnrBisv5s4z8uaCSAEhL3eMUSzqPFkkvDR8jPOWYVMw4 tHp42FztwVEZl43CNQojS3oRQ5VpX3IRQOlq3Ojcsq9Lcovze8hnGyEE7ZWuHqbd xKF6SbTiLsmlzI6UFsVfwC9+GEEPwoBG4WWOxQr5Ryn8x+EWwp/YMZpGHhkvwcTC Whi43J5uyvQOP5WuDv4IwvjsuOIxrpXW+uvuxflasf9QuYV0dEk3ZPPhr+TkQ9PN mSA9gwqmIh+bShrmy8T+ir0YTZppx3grEJQplxUGIFXqYxBJS8iykoln0XWLnhih XGfWKBx44UuoARuGfU7cJ7+KWycsWNWx0LuaK54PM+tPCcAwJtbP+AtZndYH9gLY 5CG8rlQwBQkIZbPXo2a/CYx55s5CAevClaJwPTNduwbA5+8Umy1qtAKYaSoK6auL dDvwEuQtDo5PPOB/TlDdgv+/wsbe5HerI6yltL9l18zjomG6Qpyw3RVnbI/m4QGB 90Nw6QUw13tGnQZIGQq9BqQQlwH1uSRg2I6vSA4yidJAzX1R6b28N0ZZ84TLBf2W fiH8mNoKR/nolU5RRvt7sE8bIVAkOxLI6zbevx4hE7aiHa6y7ASU2i9Ur+yQidjk eFPK2b2Ws14fGAsEbAsQ =xE31 -----END PGP SIGNATURE-----
Current thread:
- kernel: fix minor infoleak in get_user_ex() Shawn (Nov 03)
- Re: kernel: fix minor infoleak in get_user_ex() cve-assign (Nov 04)
- Re: Re: kernel: fix minor infoleak in get_user_ex() Moritz Muehlenhoff (Nov 07)
- Re: kernel: fix minor infoleak in get_user_ex() cve-assign (Nov 28)
- Re: Re: kernel: fix minor infoleak in get_user_ex() Moritz Muehlenhoff (Nov 07)
- Re: kernel: fix minor infoleak in get_user_ex() cve-assign (Nov 04)