Date: Wed, 3 Dec 2014 17:30:57 -0600 From: "Joshua J. Drake" <oss-sec-pmgetbl@...p.org> To: oss-security@...ts.openwall.com Cc: Santiago Vila <sanvila@...ian.org>, Tero Marttila <terom@...me.fi> Subject: Re: CVE request: procmail heap overflow in getlline() Is it possible to trigger this issue with untrusted input or only trusted input from procmailrc? Joshua On Wed, Dec 03, 2014 at 11:31:20PM +0200, Henri Salo wrote: > Please assign 2014 CVE for procmail heap overflow in getlline() as described in > following Debian BTS item <https://bugs.debian.org/771958> reported by Tero > Marttila. Please comment if you need more information about the issue. > > --- > Henri Salo Download attachment "signature.asc" of type "application/pgp-signature" (812 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.