Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 18 Jan 2015 15:11:55 -0500 (EST)
From: cve-assign@...re.org
To: Martin Prpic <mprpic@...hat.com>
cc: oss-security@...ts.openwall.com, cve-assign@...re.org
Subject: Re: CVE request: directory traversal flaw in patch


On Wed, 14 Jan 2015, Martin Prpic wrote:

> Hi,
>
> A directory traversal flaw was reported in patch:
>
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775227
> https://bugzilla.redhat.com/show_bug.cgi?id=1182154
>
> Could a CVE please be assigned to this issue? Thank you.
>
> --
> Martin Prpič / Red Hat Product Security

Use CVE-2015-1196.

---

CVE assignment team, MITRE CVE Numbering Authority M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ