Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 6 Jan 2012 11:23:41 -0500 (EST)
From: cve-assign@...re.org
To: oss-security@...ts.openwall.com
Cc: cve-assign@...re.org
Subject: Re: CVE-2011-4858 confusion

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

The new CVE mapping for this Apache Tomcat issue is:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4858

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4084 (rejected)

(MITRE had previously been sent information about test cases and test
results that suggested a different mapping. However, yesterday we
received updated information about test cases and test results.)

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S S145
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/obtain_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (SunOS)

iQEcBAEBAgAGBQJPBx8PAAoJEGvefgSNfHMdwCwH/RMtGSZ/DFJ91M5+o7XyW6CO
jUpzceBMXk7UHbt89VZC974yQJ+kAQf9AjyWCfsknkalfZAWAiAgAJiqMq5+HoG4
epMQ5zGG3KjqQrXqa+lo4+OyL0yuNyLp2MHBmaOoXFbSSSJCncJVhuhPYwFQZ+jI
0QRKCck7ml3brEMQGfHAm7K2ImO4A/hbarUi1mNU5JUhfFoCGBt9ObNDVKsD1oLN
X/wYMyoVz6PuiUWSb7r1HFFXFy7mqGaNc5GU6Fw8YveEC6B/EOZD/t4HkjyqYgJ/
QI7yZ0QtCU0PG3fyPUdzMSsSiEI+MhWgGv93xEss4WsLodgQirvK2Pl5RGoY8/o=
=ho10
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ