Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 03 Feb 2013 21:11:13 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE id request: latd

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 02/03/2013 04:48 AM, Nico Golde wrote:
> Hey, latd suffers of a buffer overflow when processing the version
> header and generating an error message.
> 
> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699625
> 
> Can we get a CVE id for this?
> 
> Cheers Nico

Please use CVE-2013-0251 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=U5vX
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.