[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] Re: kernel: fix minor infoleak in get_user_ex()
From:       <cve-assign () mitre ! org>
Date:       2016-11-28 8:49:09
Message-ID: 90cda9c173e44ef5a56478ba116836fb () imshyb02 ! MITRE ! ORG
[Download RAW message or body]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> the LWN comment by Brad Spengler referenced above refers to a new issue
> which affected some Linux stable lines, which backported
> 1c109fabbd51863475cd12ac206bdd249aee35af without also backporting
> 548acf19234dbda5a52d5a8e7e205af46e9da840.
> 
> So please assign a second CVE ID for the latter.

https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9644

- -- 
CVE Assignment Team
M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
[ A PGP key is available for encrypted communications at
  http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=xE31
-----END PGP SIGNATURE-----
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic