Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <201210082352.q98Npq8N018527@linus.mitre.org>
Date: Mon, 8 Oct 2012 19:51:52 -0400 (EDT)
From: cve-assign@...re.org
To: seth.arnold@...onical.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request: QT CRIME vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

>http://permalink.gmane.org/gmane.comp.lib.qt.devel/6729 :

>A security vulnerability has been discovered in the SSL/TLS protocol,
>which affects connections using compression. All versions of TLS are
>believed to be affected. To address this, Qt will disable TLS
>compression by default.

This disclosure should be mapped only to CVE-2012-4929. There should
not be product-specific CVE names for this issue in the TLS protocol.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (SunOS)

iQEcBAEBAgAGBQJQc2VGAAoJEGvefgSNfHMd4ToH/i5Z594Ozgi3oeEO6cUB3sKv
38vnY2QvqMyRo0+/11sXFnemi2mGu+ih+ChcB2zH1a3TSNvqTP7KySnH2BmbvdSF
JpQX/frtsoMUMuOheaxMtIVZ+6tKhuJcSE+7/DBCajvMbM2pb7NkJ4Agd00hriO9
LRliPVcYNdPo6XOgHNpkIDPHcZldKp5HdN72k5nzPsVFnhSs66OPxXiDW9xA6HwX
2KAOV/bBigzo6t809Y4rob1rmG11PMv3fWzXpScgPKBIfyPjf/7pfISr9JxmNpow
DSjBPkNMZ0C19RlTmkp9cpcTasijuKDC1oMtelcvkIGPq0yJubLqSwdS3SJStqw=
=5YC8
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.