Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 13 May 2015 18:58:17 +0200
From: Salvatore Bonaccorso <carnil@...ian.org>
To: OSS Security Mailinglist <oss-security@...ts.openwall.com>
Cc: CVE Assignments MITRE <cve-assign@...re.org>
Subject: CVE Request: t1utils: buffer overflow in set_cs_start

Hi

Jakub Wilk reported a buffer overflow in t1utils which potentially can
be exploited for code execution. Original bug report is at

https://bugs.debian.org/779274

Upstream bugreport: https://github.com/kohler/t1utils/issues/4

Upstrem fix:
https://github.com/kohler/t1utils/commit/6b9d1aafcb61a3663c883663eb19ccdbfcde8d33

Additional information is as well provided in:

https://bugzilla.redhat.com/show_bug.cgi?id=1218365#c7

Could you please assign a CVE for this issue?

Regards,
Salvatore

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.