Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20150128080806.GO24150@more-magic.net>
Date: Wed, 28 Jan 2015 09:08:06 +0100
From: Peter Bex <peter@...e-magic.net>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request for buffer overrun in CHICKEN
 Scheme's substring-index[-ci] procedures

On Mon, Jan 12, 2015 at 05:44:37PM +0100, Moritz Heidkamp wrote:
> Hello,
> 
> I would like to request a CVE for a buffer overrun vulnerability in
> CHICKEN Scheme's substring-index[-ci] procedures.

What's the status on this?  The CVE request was made over 2 weeks ago
yet there hasn't been an ID assigned.

Cheers,
Peter Bex

Download attachment "signature.asc" of type "application/pgp-signature" (491 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.