|
Message-ID: <20150703111524.762f89eb@redhat.com> Date: Fri, 3 Jul 2015 11:15:24 +0200 From: Stefan Cornelius <scorneli@...hat.com> To: oss-security@...ts.openwall.com Subject: Re: CVE-2015-3258 CVE-2015-3279 cups-filters On Fri, 26 Jun 2015 19:59:14 +0200 Stefan Cornelius <scorneli@...hat.com> wrote: > Hi again, > > I think there's a possible problem with the patch that I failed to > catch earlier in the process, so you may want to hold packaging for a > bit until this is fully investigated. > > Sorry for the inconvenience. Hi, Even with the patch for CVE-2015-3258 in version 1.0.70 it was possible to trigger an integer overflow leading to a heap-based buffer overflow using the same vector (specially crafted line sizes). The integer overflow has been assigned CVE-2015-3279 and is fixed in version 1.0.71. Apart from that, the patch also hardens against possible crashes due to missing calloc() success checks. Patch: http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7365 Red Hat bug: https://bugzilla.redhat.com/show_bug.cgi?id=1238990 Thanks, -- Stefan Cornelius / Red Hat Product Security
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.