Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 11 Jun 2014 15:21:50 -0400 (EDT)
From: cve-assign@...re.org
To: patrick@...emark.co.uk
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: Request for CVE: Bytemark Symbiosis

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> Attackers could arbitrarily blacklist individual IP addresses in the
> firewall using specially crafted usernames, providing a vector for
> denial of service attacks.
>
> This flaw was fixed with the following commit:
> 
> https://projects.bytemark.co.uk/projects/symbiosis/repository/diff?rev_to=733b0e33f60b&rev=cbb56af035bb

This has been assigned CVE-2014-3979.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTmKwJAAoJEKllVAevmvmsV5wH/igqc57Bz6/bf0RpZMm8v5u+
pEjB5CjMWAFOzuERa6fJKm/plAwrvR6o3MyAifq2XBuBZnAHa5kVAYMp3/i/1z2l
iE+TnHhbAfgH3/+/5QlUuXoe/4SI1A+pISdhH44MUexLmmSqZOJpRhF3DxKgzBkC
/4vK+eCGLHb+6zfxpWvrdwOfplc5511STk+Te3YndG5eVcNhxbxKu1KpdBKEtjYt
vk+gur2nL4STFbkjx7mb12g8xvXITiYAnkVN5tUjsDpU05L7WHeGUFV4aVrVMQzI
fyV1vKyRPxn96jPD8oINv9VnruEbwJeAehIDeIv8pw9UVcVnGnOQX6CxgV74H00=
=RgZa
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ