Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 15 Oct 2013 23:40:55 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Assign a CVE Identifier <cve-assign@...re.org>
Subject: Re: Re: browser document.cookie DoS vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 10/11/2013 11:34 AM, Joel Weinberger wrote:
> Hi there. Yes, we do CVEs, but in this case, we consider this very
> low severity and will not be creating a CVE for it. Sorry for the
> delayed response for it! --Joel

So to confirm, this crashes just a single tab or thw whole browser?


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.15 (GNU/Linux)
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=q0fJ
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.