Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <201402181140.s1IBeQsT004031@linus.mitre.org>
Date: Tue, 18 Feb 2014 06:40:26 -0500 (EST)
From: cve-assign@...re.org
To: mmcallis@...hat.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request: MuPDF Stack-based Buffer Overflow in xps_parse_color()

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> http://www.hdwsec.fr/blog/mupdf.html
> http://bugs.ghostscript.com/show_bug.cgi?id=694957
> http://git.ghostscript.com/?p=mupdf.git;a=commit;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
> https://bugzilla.redhat.com/show_bug.cgi?id=1056699

Use CVE-2014-2013.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTA0V/AAoJEKllVAevmvmssbwH/j2ldwwaJsPLjTSBR6+2J3tj
8EoFWqxSH8hkZNRFAEe62GqEQZZwMsjq2XMSNK/IPtikTotRW/IIUp/wPDJ03b0H
CEN0jkYXSzynGyDCSMbL7YoRmBFKB1yoawU0G0DtVR9pS65vt06qeqd9VK11YaG6
Kr2pwdyyRjP2h9IGSE/93vgwlWXswQAzWigiOez2TVJ+CDqCzR7GAUEPrYGaW2wK
JHl5v9NnkIjtJ4TGMqL4EWfZRygH7zLB3+D/7mPC6kgKVGh0Ad7OEa5/4Bv+wLC6
1nL3YeSoN5HIV6PO5yrwCZbv/8j1sTtywkAR1jc1H3+ZoPvEtCMpsGaaUTSngxc=
=1pBw
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.