Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed,  2 Sep 2015 02:45:25 -0400 (EDT)
From: cve-assign@...re.org
To: kseifried@...hat.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com, security@...nafs.org, security@...ba.org
Subject: Re: CVE REJECT CVE-2015-3287

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> can you please REJECT CVE-2015-3287 and assign a NEW CVE for the
> OpenAFS issue

Yes, CVE-2015-6587 replaces CVE-2015-3287 for the OPENAFS-SA-2015-006
"Buffer overflow in OpenAFS vlserver" issue.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=xmzw
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.