Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 27 May 2015 15:57:43 +0200
From: Tomas Hoger <thoger@...hat.com>
To: cve-assign@...re.org
Cc: Jouni Malinen <j@...fi>, oss-security@...ts.openwall.com
Subject: Re: CVE request: vulnerability in wpa_supplicant and
 hostapd

On Sat, 9 May 2015 21:22:14 +0300 Jouni Malinen wrote:

> > On Thu, May 07, 2015 at 01:58:27PM +0200, Martin Prpic wrote:
> > > Hi, I don't see a CVE assigned for this anywhere:
> > > http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt
> 
> In support of this CVE assignment request for hostapd/wpa_supplicant,

Re-sending with cve-assign@ CCed.  There were 3 CVE requests for
wpa_supplicant / hostapd that got no response:

http://www.openwall.com/lists/oss-security/2015/05/09/6
http://www.openwall.com/lists/oss-security/2015/05/09/4
http://www.openwall.com/lists/oss-security/2015/05/09/5

-- 
Tomas Hoger / Red Hat Product Security

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ