![]() |
|
Message-ID: <20120202194619.GA13034@openwall.com> Date: Thu, 2 Feb 2012 23:46:19 +0400 From: Solar Designer <solar@...nwall.com> To: oss-security@...ts.openwall.com Subject: Re: PHP remote code execution introduced via HashDoS fix Tomas, Thank you for posting this. On Thu, Feb 02, 2012 at 08:12:22PM +0100, Tomas Hoger wrote: > This got CVE-2012-0830 assigned earlier today. This is sent to make > the assignment public and avoid possible duplicate assignment. I suggest that we post this sort of things to oss-security not only because of CVE issues, but also to make this list a central place to keep people informed of security issues in at least popular Open Source software. That is, I think this posting would be desirable even if the CVE number had already been communicated to those who might request one. Not everyone who wants this sort of info also happens to read IT news sites, Twitter feeds, etc daily (which also include lots of other info that would be off-topic here). Maybe your comment above was addressed to security@php and Stefan rather than to oss-security, though. Then it sounds just right to me. Alexander
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.