Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 13 Feb 2014 15:28:24 +1100
From: Murray McAllister <mmcallis@...hat.com>
To: oss-security@...ts.openwall.com
CC: cve-assign@...re.org
Subject: Re: information on "ImageMagick PSD Images Processing RLE Decoding
 Buffer Overflow Vulnerability"

On 02/13/2014 03:11 AM, cve-assign@...re.org wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
>> that's still 4 bytes too many
>
> Use CVE-2014-1947.

Thanks to everyone who explained this to me off-list.

Peter Hutterer of Red Hat has added some information about all of this 
to https://bugzilla.redhat.com/show_bug.cgi?id=1064098#c4

To summarize, what I posted here originally is 
http://trac.imagemagick.org/changeset/13736 and has been assigned 
CVE-2014-1947

The Secunia advisory (http://secunia.com/advisories/56844/) is referring 
to this commit:

http://trac.imagemagick.org/changeset/14801

Which as far as I know does not have a CVE yet.

Cheers,

--
Murray McAllister / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.