Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 26 Oct 2015 11:02:32 +0800 (CST)
From: xiaoqixue_1  <xiaoqixue_1@....com>
To: oss-security@...ts.openwall.com
Cc: "CVE ID Requests" <cve-assign@...re.org>, 
	"Drupal Security Team" <security@...pal.org>, 
	"Evans, Jonathan L." <jevans@...re.org>
Subject:  CVE Requests for read out of bound in libpng



Hi, 
there is a memory read out of bound in libpng 1.2.* and 1.4.* , which is used in many operate systems and applications. 
it may leak information in the application .


this bug has been accepted and fixed in LIBPNG :
http://sourceforge.net/p/libpng/bugs/241/



Thanks


Best Regards.


xqx12

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ