Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 16 Mar 2017 22:15:11 +0100
From: Peter Korsgaard <peter@...sgaard.com>
To: oss-security@...ts.openwall.com
Cc: Adam Maris <amaris@...hat.com>
Subject: Re: CVE request for unchecked size argument in malloc() in CHICKEN Scheme

>>>>> "Peter" == Peter Bex <peter@...e-magic.net> writes:

 > On Thu, Mar 16, 2017 at 01:17:13PM +0100, Peter Korsgaard wrote:
 >> >>>>> "Peter" == Peter Bex <peter@...e-magic.net> writes:
 >> 
 >> > On Thu, Mar 16, 2017 at 10:31:17AM +0100, Adam Maris wrote:
 >> >> Hi Peter,
 >> >> 
 >> >> oss-security mailing is no longer a place for requesting CVEs. Please,
 >> >> request CVE from MITRE via https://cveform.mitre.org/ or also possibly
 >> >> from DWF project via http://iwantacve.org/
 >> 
 >> > Oh yeah, I forgot about that.  I've filled out the form, and I hope I've
 >> > done this correctly.
 >> 
 >> Please don't forget to forward the form details to this list once a CVE
 >> has been assigned. Thanks.

 > This was assigned CVE-2017-6949.  The form details were in my original
 > mail, but I'll include them here again, though I must say fiddling around
 > with e-mail to forward it is much much more inconvenient than how it used
 > to work:

Thanks, and yes - I agree. The longer term plan is afaik that this
should happen automatically by the MITRE system.

-- 
Bye, Peter Korsgaard

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ