Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 26 Feb 2015 12:36:21 -0500 (EST)
From: cve-assign@...re.org
To: seb@...ian.org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request: mod-gnutls: GnuTLSClientVerify require is ignored

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

OK, we'll provide both because someone else might be interested in a
CVE mapping for the 2009 issue.

>>   one CVE-2009-#### ID  -- vulnerability involving the directory context

Use CVE-2009-5144.


>>   one CVE-2015-#### ID  -- vulnerability involving the server config context

Use CVE-2015-2091.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJU71kMAAoJEKllVAevmvmsmTEH/2qv8B78/6a6jN3L5ZV5hqHc
utcT9cx0YKmIOk84Qioa5SYaX5KpCbcBPiv7ARK4n3l/jEGGUEAzhOFGvRNDLYPl
au0A6bn48dfyB1txoFZmN3Uv+XjE3iQmmGNfFPTem3BaTvV9+Fmx9zG6APQkE407
YbukxJ43MKLvQgJvKJF+uvb+UlRbXL+y38S+JDR7i6xOVqmGmY0VyRMHEI0u9WoA
PIQtczND5fdJYkYG/1kRGpaUHgKj8PCBQc7+8UQjUxCVm6EzHtwuKCmrVTlrgXyQ
J284WP+kDGTctmEmTuKH2IJGCe04oKvr0DdpadwZisrI7+PJKwDEI9/IwqJ+MWk=
=fJok
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ