Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 12 Oct 2014 23:50:54 -0400 (EDT)
From: cve-assign@...re.org
To: mbp@...rcefrog.net
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: [CVE Requests] rsync and librsync collisions

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> I'm the librsync (not rsync) maintainer. I can confirm this is a real bug,
> and I would like a CVE assigned.

Use CVE-2014-8242 for this vulnerability in librsync; this CVE ID does
not apply to rsync.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJUO0tyAAoJEKllVAevmvmsr8sH/RizGPMxY73myaYYd1ujyHWb
IZyrCA/olPuY0VM6hJYoL/erit6zil8cilSNSXWgLD3rK4oxIGtm9o+7aa5LDGao
Pmjd8MoIA6aWIR0k+ZzZ2eEKaVtZmoznlONdD7iCJ/xCnhioieViSTbFX6RnxDZ7
3EOT4mSe2guPBAmkR08ATykQW8HiG7HE6pOWgLtJOkRM+gpKlDT7TNeFu+8PoHbN
Uuza+ND+zKxmH+CZcsZ+5d26g6hGr8msmYdpHTg3zoCobLXlnuZUBiHz9WCKh04w
hq1EvcWSCgM6esUtPRRpRsdZ62sJ+sN0kwzQW+7uY4fRC7N9hRiFpICMW7y6atk=
=Q9OR
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.