Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 6 Jul 2014 23:51:49 -0400 (EDT)
From: cve-assign@...re.org
To: oss-security@...ts.openwall.com
Cc: cve-assign@...re.org
Subject: Re: CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> From: David Jorm <djorm@...hat.com>
> I have now assigned CVE-2014-3540

MITRE has not yet recognized this as a CVE assignment. A further
explanation will follow.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTuhfgAAoJEKllVAevmvmsD8EH/i0FFJz1dl0KEvulIkmRd6bY
Ezq681Wmq3IgQsZjWlc+2JriBGxIThylyD+qMZopB537x+yXIvpGA4b/bzuY1P68
0BjLz646duYEN5mqhR8VqZC5kp8lREt6srNpazQoZEYxhb30Fy7TXHgQwO3qKlOo
73N1/yL0nwZlCb0yUo/paphBxnYOR7AQh9KhammIjmDfpEc9TsITjp9xzAdNZjfU
AvEjmoGzdyI9er/CyxWIYy0dTVn5lD782Xc/eScd3+SCMLCM0YyTriXXZyQyxXqI
o2EMp+P0gMtlQDiu0hvK68efHyHMbR28GhYvdaMNxouB0X9mgbQWpglpGV4VnTM=
=Vizk
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ