|
Message-ID: <20141204212316.0eb1a6bd@pc> Date: Thu, 4 Dec 2014 21:23:16 +0100 From: Hanno Böck <hanno@...eck.de> To: oss-security@...ts.openwall.com Subject: Re: CVE request: out-of-bounds memory access flaw in unrtf On Thu, 4 Dec 2014 20:32:25 +0100 Fabian Keil <freebsd-listen@...iankeil.de> wrote: > Potential fixes: > http://www.fabiankeil.de/sourcecode/unrtf-0.21.5-various-fixes.diff Thanks, it's just that it doesn't help much (see attachment, all crashes with your patch applied). -- Hanno Böck http://hboeck.de/ mail/jabber: hanno@...eck.de GPG: BBB51E42 Download attachment "unrtf-crashes-new.tar.xz" of type "application/x-xz" (1164 bytes) Content of type "application/pgp-signature" skipped
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.