Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 31 Aug 2012 12:24:56 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: "Steven M. Christey" <coley@...us.mitre.org>,
        Moritz Muehlenhoff <jmm@...ian.org>
Subject: Re: Three CVE requests: at-spi2-atk, as31, naxsi

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 08/31/2012 11:00 AM, Steven M. Christey wrote:
> 
> On Fri, 6 Jul 2012, Kurt Seifried wrote:
> 
>>> 2. Insecure tempfile handling in the as31 assembler 
>>> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655496
>>> Homepage: 
>>> http://wiki.erazor-zone.de/doku.php?id=wiki:projects:linux:as31
>>
>>
>>> 
Please use CVE-2012-3379 for this issue.
> 
> 
> This is a duplicate of CVE-2012-0808, assigned back in January (and
> also requested by Moritz ;-)  CVE-2012-0808 has 20,000+ Google
> hits, has an established description, was assigned earlier, and has
> the same level of authoritative vendor references (i.e. bug
> reports).  So, we will keep it.
> 
> So, REJECT CVE-2012-3379 as a duplicate of CVE-2012-0808.
> 
> - Steve

100% my fault, I didn't check the sources I normally should have.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://www.enigmail.net/
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=tpsu
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.