Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <51F0E5DA.50009@redhat.com>
Date: Thu, 25 Jul 2013 02:46:18 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Paul <pawlkt@...il.com>
Subject: Re: CVE request: timing leak in bitcoind

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 07/24/2013 10:16 AM, Paul wrote:
> Low risk issue in RPC auth. code, described here: 
> https://github.com/bitcoin/bitcoin/issues/2838


Please use CVE-2013-4165  for this issue.


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=G2hb
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.