|
Message-Id: <20141127041559.68B37B2E0FA@smtpvbsrv1.mitre.org> Date: Wed, 26 Nov 2014 23:15:59 -0500 (EST) From: cve-assign@...re.org To: hanno@...eck.de Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: CVE Request: buffer overflow in ksba_oid_to_str in Libksba -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > Please note that this affects both libksba and gnupg (only version > 2.1.0 and betas). > > They share the code, but it's in different products, I don't know if > this means 2 CVEs should be assigned. The single CVE-2014-9087 number applies to both Libksba and GnuPG. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJUdqPAAAoJEKllVAevmvmsSt8IAKQgKRBCtuWWfg1VKPDy0mQI 7vMDUbJmPHehnU7xev27k+M491R210piHoQw2EmZ091/RBrnLjz0Mamudsj9T0+Y HJcqoz0rO9pjPhFH7seexaJt30NOQgbeSia//ugdRZ2Qh+tRj+cqxBCcrRMrTbMK Rb1vq2j+ol8ZKsfDsFFCWtrjOBtWTytvZJpM63SmLOSyyMqmSbPLs9RzbDGUKJfJ TXOh8+M6XYvQ5bGic/3kPDNY9ta16B8xF7C+wlUgJanGm3ZtbubXjxVRWt0sgxf3 VWado8TJxc0m9nHFnw1P3k5xIGXVgLkZWPWM02qZNeK86e31NsDtCKGdcPfoaOU= =E7Bu -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.