Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 3 Dec 2014 23:31:20 +0200
From: Henri Salo <henri@...v.fi>
To: oss-security@...ts.openwall.com
Cc: Santiago Vila <sanvila@...ian.org>, Tero Marttila <terom@...me.fi>
Subject: CVE request: procmail heap overflow in getlline()

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Please assign 2014 CVE for procmail heap overflow in getlline() as described in
following Debian BTS item <https://bugs.debian.org/771958> reported by Tero
Marttila. Please comment if you need more information about the issue.

- ---
Henri Salo
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlR/gSgACgkQXf6hBi6kbk9m1QCdHE6tWMtXRxZZuK+60p+cHXbw
vB8AoJ9kFQ6TnjB3LA/qjTcS821pcnsJ
=XLz0
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.