Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 26 Oct 2015 11:02:32 +0800 (CST)
From: xiaoqixue_1  <>
Cc: "CVE ID Requests" <>, 
	"Drupal Security Team" <>, 
	"Evans, Jonathan L." <>
Subject:  CVE Requests for read out of bound in libpng

there is a memory read out of bound in libpng 1.2.* and 1.4.* , which is used in many operate systems and applications. 
it may leak information in the application .

this bug has been accepted and fixed in LIBPNG :


Best Regards.


Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ