Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 09 Sep 2013 14:02:47 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: Agostino Sarubbo <ago@...too.org>
CC: oss-security@...ts.openwall.com
Subject: Re: CVE request: Torque privilege escalation

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 09/09/2013 11:31 AM, Agostino Sarubbo wrote:
> On Monday 09 September 2013 10:35:20 Kurt Seifried wrote:
>> Please include links to the vulns/source code fixes/original 
>> information thanks.
> 
> Did you see the link that contains the patch?
> 

No I did not, please use CVE-2013-4319 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)
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=IDzk
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ