Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 11 Jan 2013 14:57:15 -0700
From: Vincent Danen <vdanen@...hat.com>
To: cve-assign@...re.org
Cc: oss-security@...ts.openwall.com
Subject: Re: Confirming CVE for ettercap buffer overflow flaw (CVE-2012-0722?)

* [2013-01-11 16:52:22 -0500] cve-assign@...re.org wrote:

>>This isn't on MITRE's site (reserved), and the initial advisory
>>indicates that this has a CVE of CVE-2012-0722.
>
>Thanks very much for asking about this. The correct ID was
>CVE-2013-0722 and regrettably CVE-2012-0722 needed to be rejected in
>favor of CVE-2013-0722.

Great, thank you for this confirmation.

-- 
Vincent Danen / Red Hat Security Response Team 

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.