Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 24 Jan 2012 18:28:19 +0100
From: Moritz Muehlenhoff <jmm@...ian.org>
To: oss-security@...ts.openwall.com
Subject: CVE requests: Suhosin extension / as31

Please please assign two CVE IDs:

1. Suhosin extension "transparent cookie encryption 
   buffer overflow"
   
   http://seclists.org/fulldisclosure/2012/Jan/295

2. Insecure temporary file in as31 assembler

   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655496

Cheers,
        Moritz

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ