Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Sat, 07 Feb 2015 10:27:29 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: Assign a CVE Identifier <cve-assign@...re.org>,
        "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com>
Subject: ghostscript double free and invalid read caused by embedded jbig2
 data

https://bugzilla.redhat.com/show_bug.cgi?id=570425

I'm pretty sure this issue is different than CVE-2009-0196

-- 
Kurt Seifried -- Red Hat -- Product Security -- Cloud
PGP A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993


Download attachment "signature.asc" of type "application/pgp-signature" (820 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.