Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 29 May 2013 12:01:39 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Forest Monsen <forest.monsen@...il.com>
Subject: Re: CVE request for Drupal contributed modules

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 05/29/2013 10:46 AM, Forest Monsen wrote:
> Hi there,
> 
> I'd like to request CVE identifiers for:
> 
> SA-CONTRIB-2013-048 - Edit Limit - Access Bypass 
> http://drupal.org/node/2007048

Please use CVE-2013-2122 for this issue.

> SA-CONTRIB-2013-049 - Node access user reference - Access Bypass 
> http://drupal.org/node/2007122

Please use CVE-2013-2123 for this issue.

> Thanks!
> 
> Forest
> 

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=sE1C
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ