Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed,  2 Dec 2015 00:00:31 -0500 (EST)
From: cve-assign@...re.org
To: hanno@...eck.de
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: Heap Overflow in PCRE

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> https://blog.fuzzing-project.org/29-Heap-Overflow-in-PCRE.html

This is CVE-2015-8380.

The other PCRE issues have the consecutive IDs from CVE-2015-8381 to
CVE-2015-8395 inclusive. See the URLs such as:

  https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8381

These also exist now:

  https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2327
  https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2328

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=XLiq
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ