Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 13 Nov 2014 02:45:50 -0500 (EST)
From: cve-assign@...re.org
To: cherepan@...me.ru
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request: binutils -- directory traversal

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> https://sourceware.org/bugzilla/show_bug.cgi?id=17552#c4
> https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=dd9b91de2149ee81d47f708e7b0bbf57da10ad42
> Prevent archive memebers with illegal pathnames from being extracted from an archive.

Use CVE-2014-8737.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJUZGDMAAoJEKllVAevmvmsZo8H/AgXv8w/1w6B2mFs4CM549rZ
rK/sAPxlI/oryjsLyVqPH5P349xNK+xVq3lXzDwQ1A1Ge2Ht1cP2pMuirlScMBu8
t22oRqb5IoddSPlva1ydBip8kq4Q5Grx+Vjl42HF9RDT7JHz75MuVDM7p9zbOAEA
vO07ld8cpPBkxJp9uHvjDTCxCdhsYWdk45t0eb5Ze3r0IpNNPxxtdJNm4uGKV45h
cRFBVHAH1N4pq1XECBAtnogV4mrlHFJF2tYXoEGT3vmmJCEa9T5m1gkT2TVZmsr0
o8gjiJ7qzoIUkSxvub9/s16lx/9Qi6EFiivzwN2pXpLrRB3+j9BTbS3dDnMqsqY=
=+Ecv
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.