Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 4 Dec 2016 22:12:18 -0500
From: <cve-assign@...re.org>
To: <ago@...too.org>
CC: <cve-assign@...re.org>, <oss-security@...ts.openwall.com>
Subject: Re: libming: listswf: heap-based buffer overflow in _iprintf (outputtxt.c)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> https://blogs.gentoo.org/ago/2016/12/01/libming-listswf-heap-based-buffer-overflow-in-_iprintf-outputtxt-c

> AddressSanitizer: heap-buffer-overflow
> READ of size 2

Use CVE-2016-9827 for this buffer over-read.

- -- 
CVE Assignment Team
M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
[ A PGP key is available for encrypted communications at
  http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCAAGBQJYRNjHAAoJEHb/MwWLVhi2szoP/2HNdfDuYTk2tUOma5Uavxkg
fXUl7wnGcKLBJCAtJNw5Qnl4l1AE2Hirrpmfsvbid9hHNCJ8njCtdDwqHXL6IT+H
ft+XV1aqETr7IkVgC2Wg6x2ZptrFDT5Lab7iNJylDek2iSdT4oscAthjlVCJZcR5
b9MjXSih+vrsY7MxPkrcn7ZXQwWgM6nBReCpf1gZBc81l7K4ejzGBK0Xc2c6v4/Q
JxBaY2VxsxX52w842CckemTQvM5Yy7BUCdmXFqfw2dy5stTvM/OouFgqSwBqiR3Q
/AGXqZ2rIK1XoRVLtohlWUuIeIvVv9OkXNp1qM7L/QKFqURkzieOqzlo4Do97a6e
13iK8psRtMphfjjCpenjC+gujgAssqdXRDQ7cskcIB+sYwjmGoF97tJZ2OJtgQk0
TJlW0b/GokrKaeyJdYr2LSlqx+WKcrawOXDbiHAnNpZrswjKCjEbkIsGWMnGt391
aYVYegERbjlh+KpxurB5Gyocn/EVi9TczWn8TVBZYWyBSmK/ABpv7s5guZHalhH7
kAOHNI+iMaOcFvDeAG8K0oGNfNoY/oCAJa3USh3Qq/O+S9KUa+2k4sVHLyL6cCMa
Q0bCcVs5PmYATknEgTOBX9QzRqkQyhpnFB6wgEXeZPZmLf+8f29jWnOk8zQYm+M1
20ErSFbyOcSIXrnF+S4q
=6lQs
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ