Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 29 Jun 2010 18:27:27 +0200
From: Tomas Hoger <thoger@...hat.com>
To: oss-security@...ts.openwall.com
Cc: dan.j.rosenberg@...il.com
Subject: Re: CVE requests: LibTIFF

On Tue, 29 Jun 2010 08:05:25 -0400 Dan Rosenberg wrote:

> On request, I'm re-posting the issues which I think actually deserve
> CVE ids.

I believe the disagreement here is caused by different opinions on what
should be and what does not need to be called security.

> 2.  A NULL pointer derefrence in TIFFVGetField() may result in
> application crash
> (https://bugs.launchpad.net/ubuntu/lucid/+source/tiff/+bug/589145).

This got CVE-2010-2443 from Mitre few days ago.  But I guess you're
going to (or should?) ask for one more for td_stripbytecount case I
pointed out in one of the previous replies (split due to different
fixed-in version).  Sauli's fuzzer to blame for the discovery again ;).

-- 
Tomas Hoger / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.