Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 31 Jan 2014 11:03:38 +1100
From: Garth Mollett <gmollett@...hat.com>
To: oss-security@...ts.openwall.com
Subject: CVE-2013-6393 / libyaml buffer overflow

Florian Weimer of the Red Hat Product Security Team discovered a heap
based buffer overflow due to integer misuse maybe triggered when parsing
large yaml documents.

This issue has been assigned CVE-2013-6393.

https://bugzilla.redhat.com/show_bug.cgi?id=1033990

-- 
Garth Mollett / Red Hat Security Response Team



[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ