Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 15 Sep 2016 01:37:03 -0400 (EDT)
From: cve-assign@...re.org
To: vul@...safe.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request -libdwarf 20160613 heap-buffer-overflow

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> AddressSanitizer: heap-buffer-overflow
> READ of size 4
> 
> _dwarf_read_loc_section
> dwarf_loc.c:919

Use CVE-2016-7410 for this buffer over-read.

- -- 
CVE Assignment Team
M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
[ A PGP key is available for encrypted communications at
  http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=fJku
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.