Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 28 Feb 2014 15:07:41 -0500 (EST)
From: cve-assign@...re.org
To: tristan.cacqueray@...vance.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request for vulnerability in OpenStack Keystone

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> https://launchpad.net/bugs/1260080

> This results in the trust token not being invalidated by the trustee's
> token revocation (bulk revocation).

Use CVE-2014-2237.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTEOrhAAoJEKllVAevmvmsa2cH/AiKdvUmbpV91w59hZU6QDGA
0dJtg5uq+siXUXO3OwK4/20KDPvLffiA9LoOJkhBjtQDA6HKiLA8Vs/HIxCaUFXI
bDuJ37wAnVrwWdNpY6QYgPLE34Zxm7j8N/LnAI70IAD6wyUyIn+bpZ5Ct6nTnntI
pge99EgUz6MOBnnmBtTCRvviQzz3KEjSHvVT2OnR1/ebBvtHja/TaI7GQNWBfVb6
p9+o2eDvdu6+mA/WVKK5hYzgXQluE7x/1uDNawr6f2w9kONtNEXZKylT0oUqTTts
XyFRDcm4tu7Jz1yVjJ7zi28ZvpPo8siz42+vQTMPlM+459AvTwu6s5sI2MuDBGg=
=/z/h
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.