|
Message-ID: <504E1162.6000405@redhat.com> Date: Mon, 10 Sep 2012 18:12:18 +0200 From: Florian Weimer <fweimer@...hat.com> To: oss-security@...ts.openwall.com CC: Kurt Seifried <kseifried@...hat.com>, Jan Lieskovsky <jlieskov@...hat.com>, "Steven M. Christey" <coley@...us.mitre.org>, Jeff Law <law@...hat.com>, Jakub Jelinek <jakub@...hat.com> Subject: Re: CVE Request -- glibc: strcoll() integer overflow leading to buffer overflow + another alloca() stack overflow issue (upstream #14547 && #14552) On 09/07/2012 07:21 PM, Kurt Seifried wrote: >> 2) Issue #2 (mentioned here only for completeness, but I am not of >> the opinion this should receive a CVE identifier. See argumentation >> below [but open to glibc upstream / others to disprove it]). > > I will hold off on issuing a CVE for this then. Anyone want to weigh in? It looks as if the alloca issue was introduced at the same time as the malloc-related overflow: http://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5358d026c74 So perhaps one CVE is enough for glibc bugs 14552 and 14547 because the problems are similar and affect the same versions. -- Florian Weimer / Red Hat Product Security Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.