Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 17 Oct 2013 10:47:47 -0700
From: Mozilla Security <security@...illa.org>
To: cve-assign@...re.org, oss-security@...ts.openwall.com
CC: jww@...omium.org, stbuehler@...httpd.net, 
 Mozilla Security <security@...illa.org>
Subject: Re: browser document.cookie DoS vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 10/17/13 6:53 AM, cve-assign@...re.org wrote:
> There didn't seem to be further discussion of this, and the public 
> vendor references don't yet have CVE IDs, so we are assigning
> these:
> 
> CVE-2013-6166
> https://code.google.com/p/chromium/issues/detail?id=238041 
> CVE-2013-6167 https://bugzilla.mozilla.org/show_bug.cgi?id=858215

Acknowledged. Thanks.

- -- 
Al Billings
Program Manager, Mozilla Security Assurance Team
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.19 (Darwin)
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=hNi+
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.