Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 29 Dec 2014 11:36:50 -0500 (EST)
From: cve-assign@...re.org
To: oss@...ernot.info
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request: Double Free in PHP

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> I found a double-free in PHP: https://bugs.php.net/bug.php?id=68676
> 
> And it has been patched in the following commits:
> 
> http://git.php.net/?p=php-src.git;a=commit;h=2bcf69d073190e4f032d883f3416dea1b027a39e
> http://git.php.net/?p=php-src.git;a=commit;h=24125f0f26f3787c006e4a51611ba33ee3b841cb
> http://git.php.net/?p=php-src.git;a=commit;h=fbf3a6bc1abcc8a5b5226b0ad9464c37f11ddbd6

Use CVE-2014-9425.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJUoXefAAoJEKllVAevmvmsXI4H/0k6+BX4bpsDNmmM3Q+2NO31
cMsOpowphFFaTMQH0gZkSGlpphigpcRfGIBhxCXKore+zUE8C3y/S0iBgwOJX9vU
cRGAl2mkjT2rvvbTXHMEkN7X51gRVF8lW33koyUTX8U/k7vvTWM2M3J4GsYwhB61
9XYgtkXSU7cA1IPqur34zT0JFOwqcrNce9Z8SzWCr1QMNkMEDZXE8t/CKX+dmVSm
3+FdqtWRd6+oS4JlRs4RSI9rlxcrFfBbPAtV35oGSyXxDnwjwczkcE6a5iKyeEGq
OYFc5Z+M/d1gL+UsHksWegdG/X6rG+izK/6W/v7U2Cf/h/2KVAAa8/Do1mpRfXU=
=jhgX
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.