Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat, 26 Nov 2016 02:48:44 +0800
From: Kuang-che Wu <kcwu@...e.org>
To: oss-security@...ts.openwall.com
Cc: cve-assign@...re.org
Subject: Re: Re: CVE request: w3m - multiple vulnerabilities

On Wed, Nov 23, 2016 at 08:29:24PM -0500, cve-assign@...re.org wrote:
> CVE-2016-9621 - https://github.com/tats/w3m/issues/29 global-buffer-overflow write
sorry, I found I have reported this twice. It was assigned as CVE-2016-9429.


[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ