Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Sun, 22 Feb 2015 12:10:03 -0800
From: Paul Pluzhnikov <ppluzhnikov@...il.com>
To: oss-security@...ts.openwall.com
Cc: Florian Weimer <fweimer@...hat.com>
Subject: CVE request: glibc PR 17269 _IO_wstr_overflow integer overflow

Greetings,

Not sure if this is exploitable:
https://sourceware.org/bugzilla/show_bug.cgi?id=17269

Fixed by:
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bdf1ff052a8e23d637f2c838fa5642d78fcedc33

Thanks,
-- 
Paul Pluzhnikov

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.