Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 28 Mar 2016 13:15:46 -0400 (EDT)
From: cve-assign@...re.org
To: carnil@...ian.org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request: pcre: Segmentation fault on certain input to regular expressions with nested alternatives when JIT is used

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> https://bugs.debian.org/819050
> http://vcs.pcre.org/pcre?view=revision&revision=1475
> https://redmine.openinfosecfoundation.org/issues/1693

Use CVE-2014-9769.

https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9769

- -- 
CVE Assignment Team
M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
[ A PGP key is available for encrypted communications at
  http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=pYvq
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ