Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 11 Sep 2012 11:11:50 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE id request: guacd

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 09/11/2012 06:06 AM, Nico Golde wrote:
> Hi, there is a buffer overflow in the protocol handling of guacd. 
> This issue is confirmed to result in code execution. Upstream fix: 
> http://guac-dev.org/trac/changeset/7dcefa744b4a38825619c00ae8b47e5bae6e38c0/libguac
>
>  Can we please get a CVE id for this issue?
> 
> Kind regards Nico

Please use CVE-2012-4415 for this issue.


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://www.enigmail.net/
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=mxXs
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ