Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sat, 15 Nov 2014 18:10:30 +1100
From: Joshua Roers <honey@...ernot.info>
To: oss-security@...ts.openwall.com
Subject: Re: CVE-Request: dpkg handling of 'control' and warnings format string
 vulnerability

On 06/11/14 17:07, Joshua Rogers wrote:
> The vulnerable function, warningv([..]), is called in many other places,
> and is not limited to '-i'.
Just for reference: the vulnerable function is actually
parse_error_msg([..]), not warningv([..]).

Thanks,
-- 
-- Joshua Rogers <https://internot.info/>

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.