|
Message-ID: <4AD840CD.7090400@redhat.com> Date: Fri, 16 Oct 2009 11:45:49 +0200 From: Jan Lieskovsky <jlieskov@...hat.com> To: "Steven M. Christey" <coley@...us.mitre.org> CC: oss-security <oss-security@...ts.openwall.com> Subject: CVE Request - aria2 - 1.6.2 Hello Steve, vendors, aria2 upstream has released latest 1.6.2 release, fixing one DoS issue. From 1.6.2 Release Note: This release fixes segmentation fault error if URI to download contains printf format string and logging is enabled * Fixed the bug that causes segmentation fault if req->getCurrentUrl() contains printf format string such as %d. The statement that causes this bug is useless and removed. References: ----------- http://aria2.svn.sourceforge.net/viewvc/aria2/trunk/NEWS?revision=1586 https://bugzilla.redhat.com/show_bug.cgi?id=529342 Upstream patch: --------------- http://aria2.svn.sourceforge.net/viewvc/aria2/trunk/src/AbstractCommand.cc?r1=1539&r2=1572 Affected versions: ------------------ aria2-1.5.x && aria2-1.6.x (aria2-1.3.x is not vulnerable) Could you allocate a CVE identifier? Thanks && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.