Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 18 Oct 2016 10:42:15 +0300
From: Lior Kaplan <kaplanlior@...il.com>
To: oss-security@...ts.openwall.com
Subject: CVE assignment for PHP 5.6.27 and 7.0.12

Hi,

Please assign a CVE for the following issue:

Bug #73147    Use After Free in unserialize()
https://bugs.php.net/bug.php?id=73147
http://git.php.net/?p=php-src.git;a=commit;h=0e6fe3a4c96be2d3e88389a5776f878021b4c59f

Thanks,

Kaplan

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ