|
Message-Id: <20151211203331.ECA5B42E177@smtpvbsrv1.mitre.org> Date: Fri, 11 Dec 2015 15:33:31 -0500 (EST) From: cve-assign@...re.org To: oss-security@...ts.openwall.com Cc: cve-assign@...re.org Subject: Re: CVE for git issue - please use CVE-2015-7545 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 > MITRE has been actively working with the upstream vendor to determine the > appropriate number of CVEs for the vulnerabilities. This was completed today. >> CVE-2015-7545 Git: Some protocols (like git-remote-ext) can execute >> arbitrary code found in the URL MITRE has accepted this CVE-2015-7545 ID for this vulnerability disclosed by the upstream vendor in these references: https://kernel.googlesource.com/pub/scm/git/git/+/33cfccbbf35a56e190b79bdec5c85457c952a021 https://lkml.org/lkml/2015/10/5/683 https://github.com/git/git/blob/master/Documentation/RelNotes/2.3.10.txt https://github.com/git/git/blob/master/Documentation/RelNotes/2.4.10.txt https://github.com/git/git/blob/master/Documentation/RelNotes/2.5.4.txt https://github.com/git/git/blob/master/Documentation/RelNotes/2.6.1.txt - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJWazJoAAoJEL54rhJi8gl5plgP/jFffZBtqZbaDBbKk4b8a+tH Jo+eBQtn/rj8SHrGGos3Or548rGNAjtm7cYZ/fYZOOQiJReUnkIzBHdBmUMqqFZy 2r55+Mok7o7vpVYAvxqooZ8ay3RlHOmuixhw8ZwKTwITKVu7OWsCE2qpaXCB7QzV lpSh+t0xn9o6Jc+kF/eVP/J4R0X8qX6EU/JtAHHDhl1CEORujH/0bb4pAie/kJ3h vlCxn51UwQwd9q3mVrxTjFziEZOG/9UV7XowdSS1bQxt0BhTkQH42DnHDrBZCQHc 3vP9pN/23khsRQ3swUmcWD3Z7fmazqG3Q5UIPPQhrTmeYrzbryCBUAgrzWnmVbzN +OHYQWYv+JwVO/u9b3h5MFwqx0bdWcNAX2/3Bbrw8POx8c2d4+QPwX+BgQ+RfeEX z6nrfiMCj+C8vwClHzX46ipw9WiCTb+aSj22fOFPESbz+STC1QCNuO3qu4QYsuvO 8nchEB4LBtZ8FJBZtTTd0UMp4j/ojfXA/vm9qP+G/fwzaAzBtK9ncr9BHh+kEqQt iaUCHm7C10vKZ95q9s5cRz9AiCbmJK93aij1YYZxquHITP3HJUSK4L2gyHdc0jXO yqK4CHxWavslXfksnlEeRviaqNy52W429QJ/HYE6i83IQxE6tLGN7gHk5BF1LaK2 wtl1kFSYHF16UWCGzns7 =ESLW -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.