Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1442501699.676512.386375017.1A1FC407@webmail.messagingengine.com>
Date: Thu, 17 Sep 2015 09:54:59 -0500
From: Mark Felder <feld@...d.me>
To: oss-security@...ts.openwall.com
Subject: Re: CVE Request: Use-after-free in optipng 0.6.4



On Wed, Sep 16, 2015, at 06:11, Gustavo Grieco wrote:
> We found a use-after-free causing an invalid/double free in optipng
> 0.6.4.
> Upstream is working in fixing it but keep in mind that optipng 0.6.x is
> officially unsupported. A CVE will be useful since such version is
> included
> in distros like Debian and Ubuntu. Please find attached the test case to
> trigger it. The valgrind report is here:
> 

Is 0.6.5 affected? I would assume it is since you said upstream is
working on a patch...

-- 
  Mark Felder
  feld@...d.me

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.