Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sat, 31 Jan 2015 08:37:45 -0500 (EST)
From: cve-assign@...re.org
To: jmm@...ian.org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com, abe@...ian.org
Subject: Re: CVE request: Xymon

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> please assign a CVE ID for this buffer overflow in the Xymon
> network monitoring system:
> 
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776007
> http://sourceforge.net/p/xymon/code/7483/

Use CVE-2015-1430.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJUzNpEAAoJEKllVAevmvmsV/kH/1/MRA65sXmwHxGqK0OPo6Zc
RsEtv2L+rjZV04EmKlaBJ5i511StlPeT981Klnmf0K4PkLPqOo9PNUq6uy3bXpgw
3AmhO70mxfyp859g9LZV0dCYAnTe0geNEXxS3p+pF71fl1l5vrpsuU1BvjOc87sV
9oJqHI5rsgZTwbNXxySREh6X0zszH94rsBpmzDieU5D6WvMMn7cyBvzCCTW78p12
lBozDDfhwNothdKtxNKwaEjftU2InCim/+1TG4INgQSXBUG08Tgno1qxNbf7t9jQ
rHwiA86+II47afnM+tbDq8iFWL7KkbuQsAfjaToUomDVzu2x/iPpDRHTTaKwEvU=
=ALQL
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.