oss-security - CVE Request: iodine: authentication bypass by client

Openwall
Follow @Openwall on Twitter for new release announcements and other news [<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAGgu=sCpei2-3P0mhj9qxQucD-D1QGAG61GdmKWcwfxBOiFo8Q@mail.gmail.com>
Date: 2014年6月16日 23:52:44 +0200
From: Erik Ekman <yarrick@...o.se>
To: oss-security@...ts.openwall.com
Cc: Oscar Reparaz <oscar@...araz.net>
Subject: CVE Request: iodine: authentication bypass by client
Hi oss-security,
iodine 0.7.0 has just been released, which fixes an authentication bypass
issue
discovered by Oscar Reparaz. The fix is here:
https://github.com/yarrick/iodine/commit/b715be5cf3978fbe589b03b09c9398d0d791f850
and the new release is available at the homepage:
http://code.kryo.se/iodine/
Please assign a CVE id for this issue.
/Erik Ekman
iodine main developer

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.

AltStyle によって変換されたページ (->オリジナル) /