Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 11 Jul 2014 03:33:57 -0400 (EDT)
From: cve-assign@...re.org
To: vkaigoro@...hat.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request: transmission peer communication vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> http://trac.transmissionbt.com/wiki/Changes#version-2.84
> 
> Transmission 2.84 (2014/07/01)
> Fix peer communication vulnerability (no known exploits) reported by Ben Hawkes

Use CVE-2014-4909.

This seems likely to be about:

  http://inertiawar.com/submission.go
  http://twitter.com/benhawkes/statuses/484378151959539712 (2 Jul 2014)

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTv5LsAAoJEKllVAevmvmsM4UH/2FrtJ6JDH2eGrmY18I0a1/n
/rSeFlsEahsetskFRTX1LKhZJqFyMu6HX52YiK+k2UGm1o25P9kDiuT3NadfDSZ4
RrdzLqgzDsDzILJDx0w70dsWBNEXhfYg+F7ulhexPmBeHnI7kk/oMoWj0O/5gDoU
pe7p5g0z/2MC5m+3gKOEcXv0V32F02TltCnWVUrPT1VS2cladBXE8l65PGGUzPyR
cb6A2tHofAoFnUCIcUABbWvhhuJCcAEY1WpvXlHNfKaD7Fvx157cDTp0KvzM4O0J
JA7d+iHXEdbJszuVaxXTt0yqv9aQuFRnnLAJTTrUrsmdvXyIpgaEMN6VQ6+VSgE=
=vyg2
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.