Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 24 Oct 2013 18:28:45 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE Request: Simple Machines Forum (SMF) Remote
 file inclusion vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 10/24/2013 11:00 AM, Kevin Pawloski wrote:
> https://github.com/SimpleMachines/SMF2.1/issues/701
> 
> Affects 2.0.X and 2.1.X.
> 
> Can a CVE please be assigned to this issue?
> 
> Thank you. Kevin
> 

Please use CVE-2013-4465 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.15 (GNU/Linux)
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=j/VG
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ