Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 2 Feb 2012 23:46:19 +0400
From: Solar Designer <solar@...nwall.com>
To: oss-security@...ts.openwall.com
Subject: Re: PHP remote code execution introduced via HashDoS fix

Tomas,

Thank you for posting this.

On Thu, Feb 02, 2012 at 08:12:22PM +0100, Tomas Hoger wrote:
> This got CVE-2012-0830 assigned earlier today.  This is sent to make
> the assignment public and avoid possible duplicate assignment.

I suggest that we post this sort of things to oss-security not only
because of CVE issues, but also to make this list a central place to
keep people informed of security issues in at least popular Open Source
software.  That is, I think this posting would be desirable even if the
CVE number had already been communicated to those who might request one.

Not everyone who wants this sort of info also happens to read IT news
sites, Twitter feeds, etc daily (which also include lots of other info
that would be off-topic here).

Maybe your comment above was addressed to security@php and Stefan rather
than to oss-security, though.  Then it sounds just right to me.

Alexander

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.