Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <56E9516E.4030608@gmail.com>
Date: Wed, 16 Mar 2016 13:28:30 +0100
From: FEIST Josselin <josselin.feist@...il.com>
To: oss-security@...ts.openwall.com
Subject: CVE Request : Use-after-free in gifcolor

Hi,

Multiples double-free / use-after-free (with the same root origin) were
reported in giflib (https://sourceforge.net/projects/giflib/) on
February 18.
It affects the utility gifcolor. More information here:
https://sourceforge.net/p/giflib/bugs/83/
The fixed version should be release soon.

Since the vuln is medium/severe (double-free/use-after-free), but the
attack surface is low (it affects only gifcolor, no the lib itself),
could it be possible to receive a CVE number for it ?

It was found with the help of the static analyzer GUEB.

Thanks !
Best regards,
Josselin Feist

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.