Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 10 Mar 2015 10:16:26 -0400 (EDT)
From: Francisco Alonso <>
Subject: CVE Request: PHP 5.6.6 changelog


Could a CVE be please assigned to the following issues? [3] (in case it was
not requested to MITRE before):

[1] PHP: heap buffer overflow in enchant_broker_request_dict() :

[2] PHP: Double free with disabled ZMM:;a=commit;h=91aa340180eccfc15d4a143b54d47b8120f898be

[3] PHP: use after free in phar_object.c;a=commit;h=b2cf3f064b8f5efef89bb084521b61318c71781b

Thank you

Francisco Alonso / Red Hat Product Security
PGP: 0xA026440E 0825 020C 7A5A 4F86 9038  B1C8 5562 688F A026 440E

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ