Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 24 Nov 2015 12:18:27 +0100
From: Moritz Muehlenhoff <jmm@...ian.org>
To: oss-security@...ts.openwall.com
Cc: cve-assign@...re.org
Subject: Re: Heap Overflow in PCRE

Hanno Böck wrote:
> Appart from that a couple of other vulnerabilities found by other
> people have been fixed in this release:

https://bugs.exim.org/show_bug.cgi?id=1638 is CVE-2015-3217

The other unassigned issues already have open CVE requests:

https://bugs.exim.org/show_bug.cgi?id=1503
-> http://www.openwall.com/lists/oss-security/2015/05/31/5

https://bugs.exim.org/show_bug.cgi?id=1672
-> http://www.openwall.com/lists/oss-security/2015/08/24/1

https://bugs.exim.org/show_bug.cgi?id=1515
-> http://www.openwall.com/lists/oss-security/2015/05/31/4

https://bugs.exim.org/show_bug.cgi?id=1667
-> http://www.openwall.com/lists/oss-security/2015/08/05/3

Cheers,
        Moritz

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.