|
Message-ID: <20131031144701.73becd57@redhat.com> Date: Thu, 31 Oct 2013 14:47:01 +0100 From: Tomas Hoger <thoger@...hat.com> To: oss-security@...ts.openwall.com Subject: Re: CVE Request: gnutls/libdane buffer overflow On Thu, 24 Oct 2013 16:04:10 +0200 Marcus Meissner wrote: > GNUTLS just posted a security adivsory which needs a CVE: > > http://www.gnutls.org/security.html#GNUTLS-SA-2013-3 > GNUTLS-SA-2013-3 It is updated now and recommends using 3.1.16 or 3.2.6, which correct off-by-one issue in the original fix: https://gitorious.org/gnutls/gnutls/commit/0dd5529509e46b11d5c0f3f26f99294e0e5fa6dc I assume this needs a new CVE. -- Tomas Hoger / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.