Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 20 Aug 2010 12:59:15 -0400 (EDT)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request: PHP MOPS-2010-56..60


Apologies to everyone, especially Moritz who pinged me on this privately a 
while ago.

Some of these CVEs are SPLIT based on very narrow distinctions between 
types of buffer overflows, where others might have merged.  This is one 
area where there can be some variability in CVE assignments depending on 
the amount of available information.


CVE-2010-3062

   - MOPS-2010-056, MOPS-2010-057
   - buffer overflow with untrusted length

CVE-2010-3063

   - MOPS-2010-058
   - buffer overflow with calculation error

CVE-2010-3064

   - MOPS-2010-059
   - classic overflow

CVE-2010-3065
   - MOPS-2010-060
   - session deserializer data injection



- Steve

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.