Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 30 Jun 2014 02:10:18 -0400 (EDT)
From: cve-assign@...re.org
To: carnil@...ian.org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: Confusion on CVE-2014-0235

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> CVE-2014-0235 file: extensive backtracking in awk rule regular expression

> CVE-2014-0235 Microsoft Internet Explorer CElement Use-After-Free Remote Code Execution Vulnerability

Thanks for noting this. We have asked possibly responsible parties and
will send correct CVE assignments here when they are known.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTsP7wAAoJEKllVAevmvmswzYH/j2HQruIYiSiWQCryZo8716e
5Rofgdy9ZqLQ/mGdWt//XFC/PsBxoekiIwnsPrAF8OjYunhK3ldFwoDle9BFBTAv
h4NFBhU9TG7vrytTs0TPhOlV8ovWLac+fzULH3Lb8fk4is1uFCgvDY+35Iau7fRt
aaGpoU7MnCXP06i13y74S6zfQTLvJWRTjkJl6VF6LDRsxOQZ1IPN2l19VhEEt7aw
FkA3+t96QnaiNrgNrQdoVOa02mGHeX/Ka9ucg7rfQHDo8jTLR7n8nS9dN5OcXfJQ
+/iu40df3pFSpZiBQkBVKGxMZ/FHLYSFTUyuGe4OCNkZJ8gEPBCiXo9Ka9NxtE0=
=FlA7
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.