|
Message-Id: <20160314042941.7237252E003@smtpvbsrv1.mitre.org> Date: Mon, 14 Mar 2016 00:29:41 -0400 (EDT) From: cve-assign@...re.org To: dkasyanov@...udlinux.com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: CVE Request: PHP-5.5.33: Use after free in WDDX Deserialize when processing XML data -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 > https://bugs.php.net/bug.php?id=71587 Use CVE-2016-3141. - -- CVE Assignment Team M/S M300, 202 Burlington Road, Bedford, MA 01730 USA [ A PGP key is available for encrypted communications at http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJW5j3gAAoJEL54rhJi8gl5mF0P+gJGRd7gKQIEY0r/pKdf18Ay SC8hAOCPDGfg8rYkPDUDBaoCjgkM29T9AuZJ3pCkfys3vzE2/G4XCRB8EysowGBj 0jlaVZE54TrvnVXdZ8rsAFOz0m29pjjGwYXIsxZLjDoBxGOtU0PBAdz9zCbyP4ws BoTHvwRsMGa8dcRqUnFoLMlBd0lSteVFiv8d3w2tEu+vIRhr//VUn1dGvb94l65n TgP+oMqE9PPr4S8MdUvMFd6XzuoCj8nQ5MJXce2aJzPdQnkgNOa4U+cGLQDykAX2 fHQXjguU/2N1+F6xAy7ydh9ywpNpDFla01ayvbIFC3aXtiA5ONdcYunB9lMWoq04 wK0FhxH0/UD/Msp6jBjWQdvFlAuQJwuDqiuD8Dcs/Am+4PMAtP06gl06aIqjEk88 NXktFkkzHSfoczzkwSRp6J023bLdrTykcXsk3O5/hsrB4XsrlERGYT5TgqknAriK zPIh5IKK88u5UfrilGfYZgIQYt2++j+4ZKoYIl/q/3NzTmCt+/zKelLFQSFwR4FX RuPiWSMIqqchsesgHDgFSnvoAsP3d0hqcX2RBjwhBvxdpVG2LhGJgK91hrey14L1 xaK4fAq4W2mx+yC12qgWZYQVz5EYQpR+qti8mv1sexKuAbyUx6YXUEMN6eglubQs dV7j9iBVgzYJGlDGLuZe =DTa5 -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.