|
Message-ID: <20141208163633.2afe33d0@pc>
Date: Mon, 8 Dec 2014 16:36:33 +0100
From: Hanno Böck <hanno@...eck.de>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request: out-of-bounds memory access flaw in
unrtf
Just to keep people updated on this:
Jean-Francois Dockes replied to my bug reports, he's one of the last
people who did work on unrtf and he's in contact with the maintainer.
They'll work on fixing all the issues reported. I also pointed them to
Fabian's patch.
This sounds good, hopefully we'll get a new unrtf release with fixes
for all the known issues soon (now we just have to find someone to
maintain and fix catdoc and antiword).
--
Hanno Böck
http://hboeck.de/
mail/jabber: hanno@...eck.de
GPG: BBB51E42
Content of type "application/pgp-signature" skipped
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.