Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 28 Mar 2016 13:15:46 -0400 (EDT)
From: cve-assign@...re.org
To: carnil@...ian.org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request: pcre: Segmentation fault on certain input to regular expressions with nested alternatives when JIT is used

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> https://bugs.debian.org/819050
> http://vcs.pcre.org/pcre?view=revision&revision=1475
> https://redmine.openinfosecfoundation.org/issues/1693

Use CVE-2014-9769.

https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9769

- -- 
CVE Assignment Team
M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
[ A PGP key is available for encrypted communications at
  http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=pYvq
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.