Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 26 Feb 2015 12:36:21 -0500 (EST)
From: cve-assign@...re.org
To: seb@...ian.org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request: mod-gnutls: GnuTLSClientVerify require is ignored

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

OK, we'll provide both because someone else might be interested in a
CVE mapping for the 2009 issue.

>>   one CVE-2009-#### ID  -- vulnerability involving the directory context

Use CVE-2009-5144.


>>   one CVE-2015-#### ID  -- vulnerability involving the server config context

Use CVE-2015-2091.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJU71kMAAoJEKllVAevmvmsmTEH/2qv8B78/6a6jN3L5ZV5hqHc
utcT9cx0YKmIOk84Qioa5SYaX5KpCbcBPiv7ARK4n3l/jEGGUEAzhOFGvRNDLYPl
au0A6bn48dfyB1txoFZmN3Uv+XjE3iQmmGNfFPTem3BaTvV9+Fmx9zG6APQkE407
YbukxJ43MKLvQgJvKJF+uvb+UlRbXL+y38S+JDR7i6xOVqmGmY0VyRMHEI0u9WoA
PIQtczND5fdJYkYG/1kRGpaUHgKj8PCBQc7+8UQjUxCVm6EzHtwuKCmrVTlrgXyQ
J284WP+kDGTctmEmTuKH2IJGCe04oKvr0DdpadwZisrI7+PJKwDEI9/IwqJ+MWk=
=fJok
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.