Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 11 Apr 2011 16:18:25 -0400 (EDT)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: coley <coley@...re.org>
Subject: Re: CVE request for libmodplug

Please use CVE-2011-1574

Thanks.

-- 
    JB


----- Original Message -----
> A stack-based buffer overflow vulnerability was found in libmodplug
> when
> handling S3M media files. Could we get a CVE name for this?
> 
> References:
> 
> https://www.sec-consult.com/files/20110407-0_libmodplug_stackoverflow.txt
> http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commitdiff;h=aecef259828a89bb00c2e6f78e89de7363b2237b
> https://bugzilla.redhat.com/show_bug.cgi?id=695420
> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622091
> 
> Thanks.
> 
> --
> Vincent Danen / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ