Date: Sat, 04 Aug 2012 17:56:26 +0200 From: Agostino Sarubbo <ago@...too.org> To: Jeff Mitchell <mitchell@....org> Cc: oss-security@...ts.openwall.com Subject: Re: CVE request for Calligra On Saturday 04 August 2012 11:44:33 Jeff Mitchell wrote: > I don't know what Kurt wants, as he didn't respond to my email. > > What information do you want? Take a look here, an example of CVE description: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2677 Integer overflow in the ordered_malloc function in boost/pool/pool.hpp in Boost Pool before 3.9 makes it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which causes less memory to be allocated than expected. So, in this case, if you don't provide to any info, what Kurt should write? > What commit code do you want? Please post the diff between the vulnerable code and the fix so we are sure that is a security issue. -- Agostino Sarubbo / ago -at- gentoo.org Gentoo/AMD64 Arch Security Liaison GPG: 0x7CD2DC5D Download attachment "signature.asc" of type "application/pgp-signature" (491 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.