Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 12 Dec 2016 10:40:16 -0600
From: Sam Whited <sam@...whited.com>
To: oss-security@...ts.openwall.com
Cc: Salvatore Bonaccorso <carnil@...ian.org>, cve-assign@...re.org
Subject: Re: Re: CVE Request: MCabber: remote attackers can
 modify the roster and intercept messages via a crafted roster-push IQ stanza

Oops, I got the autoreply about not using this list to request CVEs
after sending that message; now I'm a bit more confused about the
current procedure; please advise.

—Sam

On Mon, Dec 12, 2016 at 10:36 AM, Sam Whited <sam@...whited.com> wrote:
> On Sun, Dec 11, 2016 at 4:29 PM,  <cve-assign@...re.org> wrote:
>> Use CVE-2016-9928.
>
> Thanks;
>
> For my edification: would it be better to send something to this list
> for CVEs in open source software in the future? I've tried the Google
> Docs form linked from the website a few times and never gotten a
> response.
>
> Best,
> Sam
>
> --
> Sam Whited



-- 
Sam Whited
pub 4096R/54083AE104EA7AD3

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.