Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 10 Dec 2015 01:16:16 -0500 (EST)
From: cve-assign@...re.org
To: xiaoqixue_1@....com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request - a out of bound read bug is found in libdwarf

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> https://bugzilla.redhat.com/show_bug.cgi?id=1289385

> if an elf file is passed to dwarfdump, a SIGSEGV will occur in libdwarf/dwarf_leb.c

> The actual problem is this seemingly corrupt abbreviation entry:

Use CVE-2015-8538.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=G32C
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.