Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 12 Oct 2014 23:50:54 -0400 (EDT)
From: cve-assign@...re.org
To: mbp@...rcefrog.net
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: [CVE Requests] rsync and librsync collisions

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> I'm the librsync (not rsync) maintainer. I can confirm this is a real bug,
> and I would like a CVE assigned.

Use CVE-2014-8242 for this vulnerability in librsync; this CVE ID does
not apply to rsync.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJUO0tyAAoJEKllVAevmvmsr8sH/RizGPMxY73myaYYd1ujyHWb
IZyrCA/olPuY0VM6hJYoL/erit6zil8cilSNSXWgLD3rK4oxIGtm9o+7aa5LDGao
Pmjd8MoIA6aWIR0k+ZzZ2eEKaVtZmoznlONdD7iCJ/xCnhioieViSTbFX6RnxDZ7
3EOT4mSe2guPBAmkR08ATykQW8HiG7HE6pOWgLtJOkRM+gpKlDT7TNeFu+8PoHbN
Uuza+ND+zKxmH+CZcsZ+5d26g6hGr8msmYdpHTg3zoCobLXlnuZUBiHz9WCKh04w
hq1EvcWSCgM6esUtPRRpRsdZ62sJ+sN0kwzQW+7uY4fRC7N9hRiFpICMW7y6atk=
=Q9OR
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ