Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu,  5 Feb 2015 15:20:51 -0500 (EST)
From: cve-assign@...re.org
To: thoger@...hat.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request - ICU

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

>> https://code.google.com/p/chromium/issues/detail?id=432209
>> https://chromium.googlesource.com/chromium/deps/icu/+/dd727641e190d60e4593bcb3a35c7f51eb4925c5
>> http://bugs.icu-project.org/trac/changeset/36801

>>   A. the entire known vulnerability is that the unpatched code
>>      calculates certain values without ensuring that they can be
>>      represented in a 24-bit field

>> Should there be one CVE ID now, for observation A alone?

> That's what can be done based on the information public at the moment.

There doesn't appear to be any additional information or another
expressed viewpoint, so we'll proceed with assigning CVE-2014-9654 for
observation A.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJU09BLAAoJEKllVAevmvmsztkH/RpBrRIk+v5Rm6hjbIO9w5Lx
Mo48AqnpwWthNobKgYKY1cQLRwuVTwwe4opZJUEOPRpjff1OiHS0m1Nhbd/E6CCh
P/yw6nZgxeXDMDjnBbzblSkbLkgXe/V3QbU+wYAuhw+/16C4jX5wx09MFnQpWKRV
y41nfyp6Xzdgl+/6R6o8t3sBXoi5kD9lZx0sndUs1ipcqzboij6k1KJvPXr5rvif
xPJfFPBxjxETBFri4Lsv+27F9q5Pjucootd2fidE47KirIDOktDxdBQOGEnjtii/
E9tsNNgoieNkb0MCMdkJmf7yGOqq3PxPB54UtSydtaiHxrwMoaCq9u+gh01p/o0=
=brIj
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.