Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <52018D42.1090109@redhat.com>
Date: Tue, 06 Aug 2013 17:56:50 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: Open Source Security <oss-security@...ts.openwall.com>,
        Assign a CVE Identifier <cve-assign@...re.org>,
        "Steven M. Christey" <coley@...re.org>
Subject: SSL BREACH

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I assume this will get handled like CVE-2009-3555?

http://threatpost.com/breach-compression-attack-steals-https-secrets-in-under-30-seconds/101579

http://it.slashdot.org/story/13/08/05/233216

https://www.djangoproject.com/weblog/2013/aug/06/breach-and-django/

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=VhC2
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.