Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 24 Sep 2014 12:57:53 +0200
From: Vasyl Kaigorodov <vkaigoro@...hat.com>
To: oss-security@...ts.openwall.com
Subject: CVE request: multiple issues in libupnp

libupnp (aka Portable UPnP SDK) has received some security fixes
involving string handling and additionally some fixes for bugs created
by a previous botched attempt to fix insecure string handling.
The previous fixes actually broke UPnP clients using libupnp (most notably VideoLan's VLC).

http://sourceforge.net/p/pupnp/bugs/122/
https://sourceforge.net/p/pupnp/mailman/message/32290824/

http://sourceforge.net/p/pupnp/code/commit_browser

The commits [0398b1] [814d15] are specifically security related.

Can CVE(s) be assigned to these?

Thanks.
-- 
Vasyl Kaigorodov | Red Hat Product Security
PGP:  0xABB6E828 A7E0 87FF 5AB5 48EB 47D0 2868 217B F9FC ABB6 E828

[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ