Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat, 3 Jan 2015 19:05:23 -0500 (EST)
From: cve-assign@...re.org
To: endeavor <endeavor@...nbowsandpwnies.com>
cc: oss-security@...ts.openwall.com, cve-assign@...re.org
Subject: Re: CVE Request: libpng 1.6.15 Heap Overflow


> I am requesting a CVE for a heap-overflow in libpng 1.6.15. It's my
> understanding that versions 1.6.9-1.6.15 are vulnerable, and according to
> patch notes it looks like some revisions in the 1.5 branch may have been
> affected as well. However, I've only tested 1.6.15 and can only speak for
> it.
>
> Link to announcement of new version:
> http://sourceforge.net/p/png-mng/mailman/message/33173461/
>
> Link to a description of the vulnerability:
> http://tfpwn.com/files/libpng_heap_overflow_1.6.15.txt
>
> Please let me know!

Use CVE-2014-9495.

---

CVE assignment team, MITRE CVE Numbering Authority M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ