Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 15 Jul 2016 08:12:10 +0800
From: Anonymous <ihunan@...il.com>
To: oss-security@...ts.openwall.com
Cc: cve-assign@...re.org
Subject: Re: CVE Request: libgd: Out-Of-Bounds Read in function
 read_image_tga of gd_tga.c

Fixed via https://github.com/libgd/libgd/commit/3c2b605d72e8b080dace1d98a6e50b46c1d12186
And cc cve-assign explicitly.

2016-07-12 15:08 Salvatore Bonaccorso <carnil@...ian org>:
> Hi
>
> Another issue was reported in the libgd issue tracker, an
> out-of-bounds reads in read_image_tga in gd_tga.c:
>
> https://github.com/libgd/libgd/issues/248
>
> Pull request: https://github.com/libgd/libgd/pull/251
>
> Upstream issue contains a reproducer for the issue and Ondřej Surý
> confirmed that this is not a duplicate of issue #247. Could you assign
> a CVE for this issue?
>
> Regards,
> Salvatore

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.