Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sat, 10 Oct 2015 11:31:31 -0400 (EDT)
From: cve-assign@...re.org
To: gustavo.grieco@...il.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request: Buffer overflow in global memory affecting optipng 0.7.5

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> We found a buffer overflow in global memory affecting optipng 0.7.5 using a
> gif file.

> ==11221== ERROR: AddressSanitizer: global-buffer-overflow on address
> 0x00000069541e at pc 0x46d24b bp 0x7fffffffaee0 sp 0x7fffffffaed8
> READ of size 1

Use CVE-2015-7802 for this buffer over-read issue.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=G+VU
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ