Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat, 15 Oct 2016 22:58:12 -0400 (EDT)
From: cve-assign@...re.org
To: ago@...too.org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: potrace: memory allocation failure

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> https://blogs.gentoo.org/ago/2016/08/29/potrace-memory-allocation-failure

> AddressSanitizer failed to allocate 0x200003000 bytes of LargeMmapAllocator

Use CVE-2016-8686.

- -- 
CVE Assignment Team
M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
[ A PGP key is available for encrypted communications at
  http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCAAGBQJYAud7AAoJEHb/MwWLVhi2mLoP+gOHwdcHB9ST9f6s+cXdsw5L
CNiHdy5X+nYHsvDCYqZq8v5x+wCcSzAKzdMyU/VhWMQVLWMKNKXfL+qm/EI67L9m
+7CG8d0G1pWuES1ynTn078ZS/wxIkudo5keiyCWGLl6ckJp0YLcQhCVC1fARNh9T
5bTetm3By5PzKGxvQO0NOOHo53Tn3bTZSf30fXqwb/qce2boMw1uD0eupRkqEwtN
jGLQYVN+31RvhJe42ojZU3NaB7XOhxZURrejLVjgjp8hSOAvSKsqP4AsECO8Dckv
9/MVc+duI35gecZ8gZHjPiMt1mlDvJrG+5fPXnbL0g7IG4VOiwCrzVkxiRGTsyE7
Dcy/JGivXOZmq2ZzB6sWT7jvKVne9/5eOKTl40ldv0Gl4XnEgoKr8lADEA8C5/5p
8+yWIj/wpap5TES5k32Yh24jkEYtOTxPwkwIvIZxIfyGqT2Tx/vG20EML7nC+gXd
fxjUrXuHIjwFoBxQ7tzArv4V9/zheGVXozTjvKoNRYkzpHcE33Q9zDIBy9dUTdkL
/8AALluIu/CQo3Rmfw//6IOVCUXCWmqyj1dWTJNI6Y9Cn7uyKmnDAhbwO82xC9NE
4FOu0TtpHWqsFQeSNbAjK7RK0bM8oFK9zK0ECUzFkci5b9HqIWn8XluBPn//exQt
DC56la9Lf9FJgtXtaUa0
=PZwg
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ