Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed,  2 Sep 2015 02:45:25 -0400 (EDT)
From: cve-assign@...re.org
To: kseifried@...hat.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com, security@...nafs.org, security@...ba.org
Subject: Re: CVE REJECT CVE-2015-3287

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> can you please REJECT CVE-2015-3287 and assign a NEW CVE for the
> OpenAFS issue

Yes, CVE-2015-6587 replaces CVE-2015-3287 for the OPENAFS-SA-2015-006
"Buffer overflow in OpenAFS vlserver" issue.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=xmzw
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ