Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 14 Mar 2016 00:29:41 -0400 (EDT)
From: cve-assign@...re.org
To: dkasyanov@...udlinux.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request: PHP-5.5.33: Use after free in WDDX Deserialize when processing XML data

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> https://bugs.php.net/bug.php?id=71587

Use CVE-2016-3141.

- -- 
CVE Assignment Team
M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
[ A PGP key is available for encrypted communications at
  http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=DTa5
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.