Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 12 Nov 2012 12:37:40 -0500 (EST)
From: cve-assign@...re.org
To: jlieskov@...hat.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request -- WeeChat (prior to 0.3.9.1): Heap-based buffer overflow when decoding IRC colors in strings

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

>[3] https://savannah.nongnu.org/bugs/?37704

This issue had similar communication sent separately to MITRE, and
was assigned CVE-2012-5854 today.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (SunOS)

iQEcBAEBAgAGBQJQoTKsAAoJEGvefgSNfHMdeWcIAK2eVnvJFf5G8EkOKmuxoGrB
uVcXw6hzKfuuJDAFyA/WM9kyZDdZesg1L7QzP6FRBfp0o4T6Pkkne8A7SkPdAaW7
ytLLGhkSJkBv3ozTTVueejsTtfBg59K2FWBhvxUoKrRWqSdNzmu0fCdTmsTfUgzk
5qd/Zx1bteZAh17FeqzTjOh9aBzIRlBhxA3+bgshTY3N0DUDBHWk/NgllwSC2Izl
ha4LIiYdoFJLMjHbr55o0cXBdyzcdbx+7/BL7nN4sD/DTojpcA6JoE+ZW2/zvJ2Z
pVoVU3zKE44lEdhmxgeKDYlqHBXbPOgfsg6o9JhKBw+8oS0rqgvuwefyWz5koA8=
=W8IZ
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.