|
Message-ID: <Pine.LNX.4.64.1501221137470.18848@beijing.mitre.org> Date: Thu, 22 Jan 2015 11:41:14 -0500 (EST) From: cve-assign@...re.org To: Jakub Wilk <jwilk@...lk.net> cc: oss-security@...ts.openwall.com, cve-assign@...re.org Subject: Re: heap overflow in procmail On Wed, 21 Jan 2015, Jakub Wilk wrote: > * Tavis Ormandy <taviso@...gle.com>, 2014-09-03, 11:52: >> I noticed a heap overflow in procmail when parsing addresses with >> unbalanced quotes. > > Unfortunately, there's more: > https://bugs.debian.org/769937 > > Apparently procmail upstream is inactive; and nobody understands how this > code works. > > At this point, I'd recommend that formail users switch to reformail[0], which > is mostly (but not completely) compatible with formail. > > [0] http://www.courier-mta.org/reformail.html > > -- > Jakub Wilk The Debian bug report does not contain diagnosis of the type of programming error that is triggering each crash, so it is not clear how many CVE identifiers must be assigned. What are the root causes of the errors for each of the three test cases? --- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ]
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.