Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 30 Jun 2014 02:10:18 -0400 (EDT)
From: cve-assign@...re.org
To: carnil@...ian.org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: Confusion on CVE-2014-0235

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> CVE-2014-0235 file: extensive backtracking in awk rule regular expression

> CVE-2014-0235 Microsoft Internet Explorer CElement Use-After-Free Remote Code Execution Vulnerability

Thanks for noting this. We have asked possibly responsible parties and
will send correct CVE assignments here when they are known.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTsP7wAAoJEKllVAevmvmswzYH/j2HQruIYiSiWQCryZo8716e
5Rofgdy9ZqLQ/mGdWt//XFC/PsBxoekiIwnsPrAF8OjYunhK3ldFwoDle9BFBTAv
h4NFBhU9TG7vrytTs0TPhOlV8ovWLac+fzULH3Lb8fk4is1uFCgvDY+35Iau7fRt
aaGpoU7MnCXP06i13y74S6zfQTLvJWRTjkJl6VF6LDRsxOQZ1IPN2l19VhEEt7aw
FkA3+t96QnaiNrgNrQdoVOa02mGHeX/Ka9ucg7rfQHDo8jTLR7n8nS9dN5OcXfJQ
+/iu40df3pFSpZiBQkBVKGxMZ/FHLYSFTUyuGe4OCNkZJ8gEPBCiXo9Ka9NxtE0=
=FlA7
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ