Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 26 Mar 2013 13:45:42 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Vincent Danen <vdanen@...hat.com>, "Larry W. Cashdollar" <larry0@...com>
Subject: Re: CVE request: ibutils improper use of files in
 /tmp

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 03/26/2013 12:44 PM, Kurt Seifried wrote:
> On 03/26/2013 08:51 AM, Vincent Danen wrote:
>> * [2013-03-26 08:28:53 -0600] Vincent Danen wrote:
> 
>> Yeah, you're right.  It was pointed out to me that it was noted 
>> here:
> 
>> http://www.openwall.com/lists/oss-security/2013/03/19/8
> 
>> Can CVE-2013-1894 be rejected?  Sorry about this, I didn't
>> notice that it was assigned one already.
> 
> Please REJECT CVE-2013-1894 and use CVE-2013-1894 instead.

Cut and paste fail.

Please REJECT CVE-2013-1894 and use CVE-2013-2561 instead.


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=+KSP
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ