Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 30 Jul 2014 13:07:57 -0400 (EDT)
From: cve-assign@...re.org
To: oss-security@...ts.openwall.com
Cc: cve-assign@...re.org
Subject: CVE-2014-5117 - Tor before 0.2.4.23 RELAY_EARLY issue

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5117 is for
an issue in Tor that requires relays to upgrade to 0.2.4.23 or
0.2.5.6-alpha.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJT2SXTAAoJEKllVAevmvmsJvEH/Rg7RGOHZg9YBIHsgyRzoZhb
J2PYoMsEWJ8wqtV4BHVTCVxBlghZzJCNRmn61z1/agHwP/DBVFrMePWlu9LibDCV
HzmHtJNNy19vAWBXIJRIuw/YlMHLiV7k46BviTjXZslr1VU851Jeuhivh1SISzK7
Q/m8VfOpZmWnLcN5VkAP6iq/zDV0+M/+ZsGKbyVGXbKZwm6MkSQV0my7tShi4YSZ
RgBXJ6DjMVPrvO/9nTX40hHQuaTONpfLzEwbXUNUhrLyqzCZGt3oHbL3JjUkyIfh
wc0tk7Z0hpKO6fvScz6MGDSROJlyaZsxG73xcuBm1917FbShPL8VjVHtdz+Sc+E=
=ysKs
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ