Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 12 Dec 2016 10:40:16 -0600
From: Sam Whited <sam@...whited.com>
To: oss-security@...ts.openwall.com
Cc: Salvatore Bonaccorso <carnil@...ian.org>, cve-assign@...re.org
Subject: Re: Re: CVE Request: MCabber: remote attackers can
 modify the roster and intercept messages via a crafted roster-push IQ stanza

Oops, I got the autoreply about not using this list to request CVEs
after sending that message; now I'm a bit more confused about the
current procedure; please advise.

—Sam

On Mon, Dec 12, 2016 at 10:36 AM, Sam Whited <sam@...whited.com> wrote:
> On Sun, Dec 11, 2016 at 4:29 PM,  <cve-assign@...re.org> wrote:
>> Use CVE-2016-9928.
>
> Thanks;
>
> For my edification: would it be better to send something to this list
> for CVEs in open source software in the future? I've tried the Google
> Docs form linked from the website a few times and never gotten a
> response.
>
> Best,
> Sam
>
> --
> Sam Whited



-- 
Sam Whited
pub 4096R/54083AE104EA7AD3

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ