Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:  Tue, 16 Dec 2008 21:10:33 -0600
From:  Raphael Geissert <atomo64+debian@...il.com>
To: oss-security@...ts.openwall.com
Subject:  CVE id request: verlihub

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi,

Two issues were discovered in verlihub: one allows remote commands execution,
and the second one is a symlink attack vulnerability.

More information at http://bugs.debian.org/506530

Could CVE ids be assigned to those issues? thanks in advance.

Cheers,
- -- 
Raphael Geissert - Debian Maintainer
www.debian.org - get.debian.net

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAklIbakACgkQYy49rUbZzlqVtACdExVg9tyyQWTbyBBh4hXhN1+o
lSoAnRDDR6D8HUIM30Tbem1pR+w4zWu+
=GQdg
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ