[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 5 Aug 2009 13:53:50 +0200
From: Thomas Biege <thomas@...e.de>
To: oss-security@...ts.openwall.com
Cc: coley@...re.org
Subject: Re: CVE request: XEmacs Multiple Integer Overflows
Hello,
was a CVE-ID allocated for this issue in the meanwhile?
On Thu, Jul 16, 2009 at 09:25:41AM +0200, Alex Legler wrote:
> Hi,
>
> I don't think we have a CVE for this/these issue(s) yet, so please
> assign one/some:
>
> The {tiff,png,jpeg}_instantiate() functions in glyphs-eimage.c contain
> an integer overflow, possibly leading to a heap-based buffer overflow.
>
> References:
> Filed upstream as: http://tracker.xemacs.org/XEmacs/its/issue534
>
> http://secunia.com/advisories/35348
> http://www.vupen.com/english/advisories/2009/1666
> https://bugs.gentoo.org/show_bug.cgi?id=275397
> https://bugzilla.redhat.com/show_bug.cgi?id=511994
>
> Thanks,
> Alex
--
Bye,
Thomas
--
Thomas Biege <thomas@...e.de>, SUSE LINUX, Security Support & Auditing
SUSE LINUX Products GmbH, GF: Markus Rex, HRB 16746 (AG Nuernberg)
--
Hamming's Motto:
The purpose of computing is insight, not numbers.
-- Richard W. Hamming
Powered by blists - more mailing lists
Please check out the
Open Source Software Security Wiki, which is counterpart to this
mailing list.
Powered by Openwall GNU/*/Linux -
Powered by OpenVZ