Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <e21dd438-42f0-afc7-b510-cc8affd352c8@redhat.com>
Date: Wed, 18 May 2016 11:33:05 +0530
From: Huzaifa Sidhpurwala <huzaifas@...hat.com>
To: oss-security@...ts.openwall.com,
        Mitre CVE assign department <cve-assign@...re.org>
Subject: CVE Request: null pointer deref in openslp, can be triggered remotely

Hi All,

The following flaw was reported to us by Yuguang Cai. Basically return
value from malloc isnt checked, in _xrealloc function. This can be
triggered remotely by sending a large number of request, which could
possibly lead malloc to fail at one point, causing crash via null
pointer deref.

Because of the way memory works on modern linux systems, this one seems
to be difficult to exploit, so i am wondering if a CVE id should really
be assigned to this issue.

Details at:
https://bugzilla.redhat.com/show_bug.cgi?id=1329295



-- 
Huzaifa Sidhpurwala / Red Hat Product Security Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.