[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: Re: [oss-security] CVE request experience (was: Multiple memory leaks fixed in Privoxy 3.0.29 stable
From: Jeffrey Walton <noloader () gmail ! com>
Date: 2020-12-25 2:05:31
Message-ID: CAH8yC8=VXvPCwbSSDv==QPOp7N+j28_9H1E0C+fSC84JbMdHQg () mail ! gmail ! com
[Download RAW message or body]
On Wed, Dec 23, 2020 at 12:21 PM Fabian Keil
<freebsd-listen@fabiankeil.de> wrote:
>
> Fabian Keil <freebsd-listen@fabiankeil.de> wrote on 2020-11-29:
>
> > Announcing Privoxy 3.0.29 stable
> [...]
> > - Security/Reliability:
> > - Fixed memory leaks when a response is buffered and the buffer
> > limit is reached or Privoxy is running out of memory.
> > Commits bbd53f1010b and 4490d451f9b. OVE-20201118-0001.
>
> I tried to get a CVE for OVE-20201118-0001 by using the
> "new" form at https://cveform.mitre.org/ on 2020-11-18 but
> was told by MITRE that "the reported vulnerabilities would
> fall in the scope of Red Hat for assignment" and that their
> mail should be forwarded to secalert@redhat.com.
> ...
Related, you are not alone. I just tried to use the form at
https://cveform.mitre.org/ to get a CVE for a memory error.
That form is impossible to use. I emailed cve@mitre.org and asked for
the assignment.
Jeff
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic