Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 4 Dec 2016 22:12:18 -0500
From: <cve-assign@...re.org>
To: <ago@...too.org>
CC: <cve-assign@...re.org>, <oss-security@...ts.openwall.com>
Subject: Re: libming: listswf: heap-based buffer overflow in _iprintf (outputtxt.c)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> https://blogs.gentoo.org/ago/2016/12/01/libming-listswf-heap-based-buffer-overflow-in-_iprintf-outputtxt-c

> AddressSanitizer: heap-buffer-overflow
> READ of size 2

Use CVE-2016-9827 for this buffer over-read.

- -- 
CVE Assignment Team
M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
[ A PGP key is available for encrypted communications at
  http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=6lQs
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.