Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 08 Jan 2013 12:59:48 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com>,
        Mitre CVE assign department <cve-assign@...re.org>
Subject: Quick note on mfsa2013-04 / CVE-2012-0759 / CVE-2013-0759

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

https://www.mozilla.org/security/announce/2013/mfsa2013-04.html

lists:

URL spoofing with credentials info of URL & 204 (CVE-2012-0759)

but actually links to CVE-2013-0759. The series CVE-2012-0751 through
CVE-2012-0780 were used entirely by Adobe last year, so a typo, just
something to be aware of.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=+fiU
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.