|
Message-ID: <20101004110743.320a1f76@redhat.com> Date: Mon, 4 Oct 2010 11:07:43 +0200 From: Tomas Hoger <thoger@...hat.com> To: oss-security@...ts.openwall.com Cc: coley <coley@...re.org> Subject: Re: CVE requests: Poppler, Quassel, Pyfribidi, Overkill, DocUtils, FireGPG, Wireshark On Fri, 1 Oct 2010 15:16:48 +0200 Tomas Hoger wrote: > 2fe825deac Prevents use of random value for PDF object that is not of > numeric type as expected. This patch, however, does not seem to guard > against invalid numeric values, so if some random value used due to an > incorrect object type can cause crash later, I'd expect malicious > numeric value to be able to achieve the same. Oh, I was too focused on the value and missed OBJECT_TYPE_CHECK checks that cause abort() when object is not numeric. The impact is limited to unexpected application termination. -- Tomas Hoger / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.