Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 26 Nov 2014 23:15:59 -0500 (EST)
From: cve-assign@...re.org
To: hanno@...eck.de
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request: buffer overflow in ksba_oid_to_str in Libksba

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> Please note that this affects both libksba and gnupg (only version
> 2.1.0 and betas).
> 
> They share the code, but it's in different products, I don't know if
> this means 2 CVEs should be assigned.

The single CVE-2014-9087 number applies to both Libksba and GnuPG.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJUdqPAAAoJEKllVAevmvmsSt8IAKQgKRBCtuWWfg1VKPDy0mQI
7vMDUbJmPHehnU7xev27k+M491R210piHoQw2EmZ091/RBrnLjz0Mamudsj9T0+Y
HJcqoz0rO9pjPhFH7seexaJt30NOQgbeSia//ugdRZ2Qh+tRj+cqxBCcrRMrTbMK
Rb1vq2j+ol8ZKsfDsFFCWtrjOBtWTytvZJpM63SmLOSyyMqmSbPLs9RzbDGUKJfJ
TXOh8+M6XYvQ5bGic/3kPDNY9ta16B8xF7C+wlUgJanGm3ZtbubXjxVRWt0sgxf3
VWado8TJxc0m9nHFnw1P3k5xIGXVgLkZWPWM02qZNeK86e31NsDtCKGdcPfoaOU=
=E7Bu
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.