Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 15 Sep 2016 01:37:03 -0400 (EDT)
From: cve-assign@...re.org
To: vul@...safe.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request -libdwarf 20160613 heap-buffer-overflow

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> AddressSanitizer: heap-buffer-overflow
> READ of size 4
> 
> _dwarf_read_loc_section
> dwarf_loc.c:919

Use CVE-2016-7410 for this buffer over-read.

- -- 
CVE Assignment Team
M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
[ A PGP key is available for encrypted communications at
  http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=fJku
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ