Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 15 May 2014 20:35:51 +0200
From: Marcin Owsiany <porridge@...ian.org>
To: oss-security@...ts.openwall.com
Subject: libgadu vulnerability: possible memory corruption

I'd like to request a CVE ID for the following issue:

A crafted message from the file relay server may cause memory to
beoverwritten. The memory is not overwritten with data sent directly by the
server, but security implications cannot be ruled out.

The bug is public:
http://lists.ziew.org/pipermail/libgadu-devel/2014-May/001171.html
http://lists.ziew.org/pipermail/libgadu-devel/2014-May/001180.html

Marcin

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ