oss-sec mailing list archives

Re: CVE request: FreeSWITCH regex substitution 3 buffer overflows


From: Kurt Seifried <kseifried () redhat com>
Date: Tue, 09 Jul 2013 17:38:26 -0600

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 07/09/2013 03:07 PM, Adam D. Barratt wrote:
On Tue, 2013-07-09 at 23:05 +0400, Michael Tokarev wrote:
A week has been passed away.

But actually I'm not sure I understand the process.  What is 
needed to, first, assign a CVE#, and second, to fill it in?

For the avoidance of doubt, you did get a reply from Kurt with a
CVE assignment in it, last week.

Regards,

Adam


And that is why I also sign them, and issue them publicly on OSS-SEC
as much as possible (easy to verify/confirm it went out). The system
works!

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=FHki
-----END PGP SIGNATURE-----


Current thread: