|
Message-ID: <4F1F178F.8010002@redhat.com> Date: Tue, 24 Jan 2012 13:41:51 -0700 From: Kurt Seifried <kseifried@...hat.com> To: oss-security@...ts.openwall.com CC: Luciano Bello <luciano@...ian.org> Subject: Re: CVE request: bip buffer overflow On 01/24/2012 02:41 AM, Luciano Bello wrote: > Hi there, > Please, assign a CVE ID for the following vulnerability in bip > (http://bip.t1r.net): https://projects.duckcorp.org/issues/269 > > The patch can be found here: > https://projects.duckcorp.org/projects/bip/repository/revisions/222a33cb84a2e52ad55a88900b7895bf9dd0262c > > This bug is present in 0.8.8 and previous versions and, according to reporter, > remote execution of code should be possible. > > Thanks, > > /luciano Excellent CVE request. Please use CVE-2012-0806 for this issue. -- -- -- Kurt Seifried / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.