Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 9 Sep 2016 14:40:07 +0800
From: ChenQin <chenqin@...sec.com.cn>
To: oss-security@...ts.openwall.com
Cc: cve-assign@...re.org
Subject: CVE request for webp:index overflow,used by memcpy later 

Product: A new image format for the Web:Webp
in function:ReadFunc

fixed here:
https://chromium-review.googlesource.com/#/c/355380/
https://cr-rev.appspot.com/bb50bf42b0a39bc378401a2d5d8eaa678813a92f


regards.
—————
anonymous,alpha lab,topsec

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ