Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sun, 03 Feb 2013 21:10:58 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Michael Gilbert <mgilbert@...ian.org>
Subject: Re: CVE id request: boost

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 02/03/2013 06:50 PM, Michael Gilbert wrote:
> Hi,
> 
> Boost has issued a security advisory for a UTF-8 validation issue/exposure:
> http://www.boost.org/users/news/boost_locale_security_notice.html
> 
> Please assign an id.
> 
> Thanks,
> Mike

Please use CVE-2013-0252 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=04LH
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ