Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu,  5 Feb 2015 12:15:51 -0500 (EST)
From: cve-assign@...re.org
To: jmm@...ian.org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request: PHP/file: out-of-bounds memory access in softmagic

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> http://bugs.gw.com/view.php?id=398
> https://github.com/file/file/commit/59e63838913eee47f5c120a6c53d4565af638158

> https://bugs.php.net/bug.php?id=68735
> https://bugs.php.net/patch-display.php?bug=68735&patch=bug68735.patch&revision=1420309079

Use CVE-2014-9652.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJU06TNAAoJEKllVAevmvmsNnMH/1Pp9TUN2QeL6HgkRc0CI/za
zE1CUHtJbgHwCP7Ky1NPJQKBrkyHT3ttxnhBAxw7UL5A/79Mv31BspwlST7nVrW5
Uytqd1whtax/csMI1aUTeBymkE4/ZgkBxdvp8LAsEax6XOsiaC1szBaCnWikB/VT
qM+5LVSQZBxJzSSV+vPUeMSMeako142sZnW7uCobKNRc5vJ7vD3xTXfDClCbaybo
e+ayRLB+jej81X/d3ILZi9GzG9wIld+1rRcxXpknVgMqUIRMxMil0hXKjdv229cu
TxES4GlZaV5bcJPatwrsf4Te5SVVWCgEdnxmzZduGnlOcEJKKG4K2v9pxVaSSTg=
=Gl2+
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ