|
Message-Id: <20151202050031.58EC536E03A@smtpvbsrv1.mitre.org> Date: Wed, 2 Dec 2015 00:00:31 -0500 (EST) From: cve-assign@...re.org To: hanno@...eck.de Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: Heap Overflow in PCRE -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 > https://blog.fuzzing-project.org/29-Heap-Overflow-in-PCRE.html This is CVE-2015-8380. The other PCRE issues have the consecutive IDs from CVE-2015-8381 to CVE-2015-8395 inclusive. See the URLs such as: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8381 These also exist now: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2327 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2328 - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJWXnnFAAoJEL54rhJi8gl5K/kP/RAmQqCnEGnwa7g1OBtPZaQk Q/LNj/yfRf5ANp3wnd8yWA0HHewHd2vwbPFYIBk6wfA9AEgHaWjPiBoQyhNPkSNH 8o4J0bNxqklMj9StlyNDE+wtYpRcHtG7PZ/PR/o2sJoZ8XNfFyZoM0TzuZpAaB3p kqkSt0YBjuRRh9A3TNRWbb/qSqOXU0hNtaxFVhXo7KxtuuhN+jDcI4hOwfBHeaa+ OrF5uNSQD5fSMxPYAUhd7G3xuH7M605qBjAXCtGfI1zGDCpcepmaAtqwKnnnWlyC aT0+pNFOIWw7oPR0cUkID44eO4Kg4Ee8jyqNIBz9/zwKA1M3nLJO5BELKAB2nw6X fVL9Qn8YbXsE0YGYXeNL8+m+rnEDqr4HYJvUa/wN0foWIIBLDED6nGCvPTxZ+kVk POkILDEHUqmXKeuWWbqV2eR8VHF2w4oS3ocy/tjvjUNbsenRTfnIS8iviflOH3Vg EFY0ysDrqZQx+ffMWZk+pO8EQ9CW/GlPSz3OkpuZ/gpmmTk/veOJl15h7Z5jqPwC wVuc8NknLOjJ0Vd0jBDaevK8P6liHvWYptSS/J+QrLonN/gW1lCszQX/y4QjFqM3 eYawwaF1AZJRP+SqXeUucrGd8w6pMzkppY4Fdkoy+FmPbL9wwbnuiJURc9CtDSY+ +f51tavGqm+B0mpC5124 =XLiq -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.