Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 02 Apr 2012 09:53:11 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Filippo Cavallarin <filippo.cavallarin@...seq.it>
Subject: Re: CVE request: OSClass directory traversal vulnerability

On 04/02/2012 01:59 AM, Filippo Cavallarin wrote:
> Hello,
> Can i get a CVE identifier for this issue:
> 
> http://www.codseq.it/advisories/osclass_directory_traversal_vulnerability
> 
> Thanks
> 
> Filippo Cavallarin
> 
> 
> C o d S e q
> Development with an eye on security
> ------------------------------------------------------------------------
> Castello 2005, 30122 Venezia
> Tel: 041 88 761 58 - Fax: 041 81 064 714 - Cell: 346 66 93 254
> c.f. CVLFPP82B27L736J - p.iva 03737650279
> http://www.codseq.it - filippo.cavallarin@...seq.it
> 

Please provide links to the original vendor advisory/ChangeLog/commits/etc.

-- 
Kurt Seifried Red Hat Security Response Team (SRT)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ