Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 14 Mar 2016 00:29:41 -0400 (EDT)
From: cve-assign@...re.org
To: dkasyanov@...udlinux.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request: PHP-5.5.33: Use after free in WDDX Deserialize when processing XML data

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> https://bugs.php.net/bug.php?id=71587

Use CVE-2016-3141.

- -- 
CVE Assignment Team
M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
[ A PGP key is available for encrypted communications at
  http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=DTa5
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ