Date: Wed, 13 May 2015 18:58:17 +0200 From: Salvatore Bonaccorso <carnil@...ian.org> To: OSS Security Mailinglist <oss-security@...ts.openwall.com> Cc: CVE Assignments MITRE <cve-assign@...re.org> Subject: CVE Request: t1utils: buffer overflow in set_cs_start Hi Jakub Wilk reported a buffer overflow in t1utils which potentially can be exploited for code execution. Original bug report is at https://bugs.debian.org/779274 Upstream bugreport: https://github.com/kohler/t1utils/issues/4 Upstrem fix: https://github.com/kohler/t1utils/commit/6b9d1aafcb61a3663c883663eb19ccdbfcde8d33 Additional information is as well provided in: https://bugzilla.redhat.com/show_bug.cgi?id=1218365#c7 Could you please assign a CVE for this issue? Regards, Salvatore
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ