Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 20 Jul 2010 09:59:11 +0200
From: Matthijs Kooijman <matthijs@...in.nl>
To: oss-security@...ts.openwall.com
Cc: rubidium@...nttd.org
Subject: CVE request for OpenTTD

Hi folks,

the OpenTTD developers have indentified a security vulnerability in the
OpenTTD program. Would you be so kind as to allocate a CVE id for this
issue?

The issue concerns a denial of service vulnerability, in the form of a
hard to trigger infinite loop. The issue is reported at
http://bugs.openttd.org/task/3909

The first vulnerable version is 1.0.1, the upcoming 1.0.3 release will
have the issue fixed.

Once a CVE id is allocated, the issue will be documented at
http://security.openttd.org/en/CVE-2010-xxxx

Thanks,

Matthijs

(Please CC me, I'm not subscribed)

Download attachment "signature.asc" of type "application/pgp-signature" (198 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.