|
Message-Id: <201402181140.s1IBeQsT004031@linus.mitre.org> Date: Tue, 18 Feb 2014 06:40:26 -0500 (EST) From: cve-assign@...re.org To: mmcallis@...hat.com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: CVE request: MuPDF Stack-based Buffer Overflow in xps_parse_color() -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > http://www.hdwsec.fr/blog/mupdf.html > http://bugs.ghostscript.com/show_bug.cgi?id=694957 > http://git.ghostscript.com/?p=mupdf.git;a=commit;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc > https://bugzilla.redhat.com/show_bug.cgi?id=1056699 Use CVE-2014-2013. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJTA0V/AAoJEKllVAevmvmssbwH/j2ldwwaJsPLjTSBR6+2J3tj 8EoFWqxSH8hkZNRFAEe62GqEQZZwMsjq2XMSNK/IPtikTotRW/IIUp/wPDJ03b0H CEN0jkYXSzynGyDCSMbL7YoRmBFKB1yoawU0G0DtVR9pS65vt06qeqd9VK11YaG6 Kr2pwdyyRjP2h9IGSE/93vgwlWXswQAzWigiOez2TVJ+CDqCzR7GAUEPrYGaW2wK JHl5v9NnkIjtJ4TGMqL4EWfZRygH7zLB3+D/7mPC6kgKVGh0Ad7OEa5/4Bv+wLC6 1nL3YeSoN5HIV6PO5yrwCZbv/8j1sTtywkAR1jc1H3+ZoPvEtCMpsGaaUTSngxc= =1pBw -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.