From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.5 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 71430C5ACAE for ; Thu, 12 Sep 2019 09:40:37 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 49E3C21479 for ; Thu, 12 Sep 2019 09:40:37 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1568281237; bh=zTCphQZeLpbw3R7zTeLLwVWbznN1/ZBpnXdvDC2P4+A=; h=Date:From:To:Cc:Subject:References:In-Reply-To:List-ID:From; b=gq9oQvA0AIb9k+yDCcdJcDBVf2kzLasuIcyg2xGe9gRf//K1+ZYztPjsZEHWwiULV FSwZHTniumGBlu8C/Q8BNT9Rvwd8qWtiNsmoOXzrzBtDTXM7nMi6OPrzaVoSGfwKTN SZebMaAuEPYaphwMFrcDdX9RFnqEK0vDRurkU1xw= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730820AbfILJkg (ORCPT ); Thu, 12 Sep 2019 05:40:36 -0400 Received: from mail.kernel.org ([198.145.29.99]:56644 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730816AbfILJkg (ORCPT ); Thu, 12 Sep 2019 05:40:36 -0400 Received: from localhost (unknown [148.69.85.38]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 16AC1208C2; Thu, 12 Sep 2019 09:40:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1568281235; bh=zTCphQZeLpbw3R7zTeLLwVWbznN1/ZBpnXdvDC2P4+A=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=uD0zLf06xsPldzV8im9O9JMp4cAp4JnGbg7wLvS+Znc7xYSfEgLDZf0IlFPyrHaFa vFNA8CT+gzw+koBvnBEXW04+BjN9RERY1XjY9lcKzfTpOSMuADhbl3cZ8F+YMRaFDw 2mAosroXBqTKkRpI/SoL3TPW7hPkPEvByr2AuAOI= Date: Thu, 12 Sep 2019 10:40:32 +0100 From: Greg Kroah-Hartman To: butt3rflyh4ck Cc: linux-kernel@vger.kernel.org, stable@vger.kernel.org, Dan Carpenter , Ka-Cheong Poon , Santosh Shilimkar , "David S. Miller" Subject: Re: [PATCH 5.2 19/94] net/rds: Fix info leak in rds6_inc_info_copy() Message-ID: <20190912094032.GA41139@kroah.com> References: <20190908121150.420989666@linuxfoundation.org> <20190908121150.989665197@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: User-Agent: Mutt/1.12.1 (2019-06-15) Sender: stable-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org On Thu, Sep 12, 2019 at 04:38:25PM +0800, butt3rflyh4ck wrote: > can the issue assigned a CVE number?please reply on me as soon as possible. > thank you As per the kernel documentation, the kernel community does not assign, or deal with, CVEs numbers at all. Just go ask for one directly from MITRE if you really feel you need one (hint, there is no real need...) thanks, greg k-h