|
Message-ID: <503520B9.7040606@redhat.com> Date: Wed, 22 Aug 2012 12:11:05 -0600 From: Kurt Seifried <kseifried@...hat.com> To: oss-security@...ts.openwall.com CC: Thijs Kinkhorst <thijs@...ian.org> Subject: Re: CVE Request: Apache mod RPAF denial of service -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 08/22/2012 03:57 AM, Thijs Kinkhorst wrote: > Hi, > > Sébastien Bocahu reported to the Debian security team a denial of > service issue in the Apache module RPAF (reverse proxy add > forward). > > http://bugs.debian.org/683984 > > Version 0.6 is not affected, 0.5 is and we've released a security > update for that. Can someone please assign a CVE id to this issue? > > > Thanks, Thijs Please use CVE-2012-3526 for this issue. - -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQIcBAEBAgAGBQJQNSC4AAoJEBYNRVNeJnmTw6gQALECxioLQHwoWkqUFiULss14 MnJayXAzWQzR0R+HG5CzJXwqy4t0P6cSlWnrEFKAfqZpOHMTZOC4EeubbKTY7N6x CLb/Wnn929ZFggiJ5ufBuG7o8t/TiHzyIN5jXrNLxukF2Y06+hL5tortjp3OYAV9 kmzqF5yGDBDuEl7JqxJYdaQqTPbhy55D/nCNNxW4AlE823FQdFqQWjMD56072MZb Z3F6vBvoPQ/1waELrMRu84+n4gPCMxdji/1/2+39CGBbWu42ey+ApnozdZiWYM+w v5wBPy1oTDqhbNeYf2biIMWA/e2fmX5PV/hl/SpKkSnmE33Q6S/ecfk9etEbAG6j VhnpT+82L8CgpX/tOoRENeKNLgp6+k5j2igLi9ZNkl4dOVG7ZxxhcK/XcLIgRmlv xLDc7VDkAtFTXd2qwt4xsZT7u0OAwrgAjWw6YnBrhMzul75AmNrBQU1AIO777xkF T5mS9VitHqnB5XNpvLDlyXlADAV1Wc112zSjsQEHRn7VkELvUX/0cgsexS5dqk+L DwJPFcf+s4aDE8ui7bjLSTRRCDA0drQCCSSVn1qm9vBu39NYYhJb/P0E+GvcaD5J BdxuL2gtiwgMAFgcXNcptg6v8SAqAg0q8hjnPi+PcSMXqGsqfZQZKkcqGh/LDaMm W/JbiByC96MHSvm6zw3N =MX/G -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.