Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sat, 31 Jan 2015 08:37:45 -0500 (EST)
From: cve-assign@...re.org
To: jmm@...ian.org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com, abe@...ian.org
Subject: Re: CVE request: Xymon

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> please assign a CVE ID for this buffer overflow in the Xymon
> network monitoring system:
> 
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776007
> http://sourceforge.net/p/xymon/code/7483/

Use CVE-2015-1430.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJUzNpEAAoJEKllVAevmvmsV/kH/1/MRA65sXmwHxGqK0OPo6Zc
RsEtv2L+rjZV04EmKlaBJ5i511StlPeT981Klnmf0K4PkLPqOo9PNUq6uy3bXpgw
3AmhO70mxfyp859g9LZV0dCYAnTe0geNEXxS3p+pF71fl1l5vrpsuU1BvjOc87sV
9oJqHI5rsgZTwbNXxySREh6X0zszH94rsBpmzDieU5D6WvMMn7cyBvzCCTW78p12
lBozDDfhwNothdKtxNKwaEjftU2InCim/+1TG4INgQSXBUG08Tgno1qxNbf7t9jQ
rHwiA86+II47afnM+tbDq8iFWL7KkbuQsAfjaToUomDVzu2x/iPpDRHTTaKwEvU=
=ALQL
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ