|
Message-ID: <526022C3.8040100@mozilla.org> Date: Thu, 17 Oct 2013 10:47:47 -0700 From: Mozilla Security <security@...illa.org> To: cve-assign@...re.org, oss-security@...ts.openwall.com CC: jww@...omium.org, stbuehler@...httpd.net, Mozilla Security <security@...illa.org> Subject: Re: browser document.cookie DoS vulnerability -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 10/17/13 6:53 AM, cve-assign@...re.org wrote: > There didn't seem to be further discussion of this, and the public > vendor references don't yet have CVE IDs, so we are assigning > these: > > CVE-2013-6166 > https://code.google.com/p/chromium/issues/detail?id=238041 > CVE-2013-6167 https://bugzilla.mozilla.org/show_bug.cgi?id=858215 Acknowledged. Thanks. - -- Al Billings Program Manager, Mozilla Security Assurance Team -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.19 (Darwin) iQIcBAEBAgAGBQJSYCLCAAoJEBAMm4nfVaFGyV8QAJwQl/ltV0HLxAbIMPGC5Yj2 cQIWpi2GuSm0c0aJwpjFzZrOB9qP0agEqMnLXNOX6vryzJtJT1NLvOuM0winXKTh O6jd+pYPlgm3nqDHA+9/zkBRSe2x4yvMa70G+MjLvTvR8IU9ljOhQFFewGSMXsZq Ol2bMTFXxSOVIXjBcWg5EFSOKTbxhFS3LvJSj86H4MLe6J0gZKNyYhz3vkeulYyt lENKI9JXk+dKvReQGFl18yUk0ix80ZOWtJ/DkNzysQSvJMWiW7EvQ7NRXo+GWH+i vwcGoJIGaEreMxkwe4/UDic8qzbN7XZ5j3ZV9EMlnClmePMWvET3I4C7MHq3ouoc z0qCvP0gmsd7EsFMSvGPyDKDxuLXTYgNDG2y5ci6WeFEBM+id7zdcEzvFINUcG9V gAQTEPkNKWg0c/SCyR8PMbI5knHUC3SUqc1Ez/0EF13PLDn9mmqmGOJ6kS+PwUlu WzIWdVD4DXY7R1fCsSjVaiGVyV4PnKfJ91M0TxWbc8hjP4Z/x7WEsEoa+UboTnKw eCYpivUOorzBX8ohaWy1rfPpKZqIGZKP4ATAWDXMv5ChXgDQBLgpSkoXz19MbTxB GNqkXDt4oS1piZczl9f5il5hHF8kTh5hRqcJKwhopzbDfgLMZJ3jG+Y+urPZaXuB NlnBea+Gna93BCeYaCf5 =hNi+ -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.