|
Message-ID: <e21dd438-42f0-afc7-b510-cc8affd352c8@redhat.com> Date: Wed, 18 May 2016 11:33:05 +0530 From: Huzaifa Sidhpurwala <huzaifas@...hat.com> To: oss-security@...ts.openwall.com, Mitre CVE assign department <cve-assign@...re.org> Subject: CVE Request: null pointer deref in openslp, can be triggered remotely Hi All, The following flaw was reported to us by Yuguang Cai. Basically return value from malloc isnt checked, in _xrealloc function. This can be triggered remotely by sending a large number of request, which could possibly lead malloc to fail at one point, causing crash via null pointer deref. Because of the way memory works on modern linux systems, this one seems to be difficult to exploit, so i am wondering if a CVE id should really be assigned to this issue. Details at: https://bugzilla.redhat.com/show_bug.cgi?id=1329295 -- Huzaifa Sidhpurwala / Red Hat Product Security Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.