Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon,  5 Sep 2016 19:04:13 -0400 (EDT)
From: cve-assign@...re.org
To: nenolod@...eferenced.org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE ID request: certificate spoofing through crafted SASL message in inspircd, charybdis

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> As is Nefarious:
> 
> https://github.com/evilnet/nefarious2/commit/f50a84bad996d438e7b31b9e74c32a41e43f8be5

Use CVE-2016-7145 for this issue only in the Nefarious 2 codebase.

- -- 
CVE Assignment Team
M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
[ A PGP key is available for encrypted communications at
  http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=dre8
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ