Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <201406260020.s5Q0KLMc001531@linus.mitre.org>
Date: Wed, 25 Jun 2014 20:20:21 -0400 (EDT)
From: cve-assign@...re.org
To: hanno@...eck.de
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request: piwigo before 2.6.3 sql injection

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

The unspecified vulnerability "[security] security failure reported
and fixed by Christopher Chrapka, ojezu.org" in
http://piwigo.org/releases/2.6.3 is assigned CVE-2014-4648.

The SQL injection that was apparently first identified in 2.6.2 and
(thus far) only fixed in 2.7.0beta2 (see the
http://piwigo.org/bugs/view.php?id=3089 page) is assigned
CVE-2014-4649.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTq2aPAAoJEKllVAevmvmsMwAH/Rejl52Ahj5KKrCr5oAkpWaR
QJtsBTFQbFGBg36aV9NnG13GLcrfHWVoLORwSr6M6W9UvslQQAA09fHfWlzj8hH9
9Ed19JIF9PFJhfb3NVs2BwpcC2Jq5tuPEBHKZ/zP+DSP4SgKo7v8UUpkNGCAa4A4
fL4jdfn8o4AW6laH2tZt7PlXxFsf2SW+PF4QqUT0aYbQrMqWrS7g+eNZQQB4LjwR
SsRPo8pPGW+5fGOxjwU1e5TcekbnPGOymhzHdHx/3vIzWiIlh5pQ5bvG/OXPTed/
CWwQ66VxYKGXQ0Uw43QT6USZY2/oyW1nGcjTq2H8oudg/KW+QJG/f1htOrawXr8=
=+pZa
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.