Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1690836.rk9JpRbEkN@wanheda>
Date: Sun, 25 Nov 2018 13:09:12 +0100
From: Agostino Sarubbo <ago@...too.org>
To: oss-security@...ts.openwall.com
Subject: Re: catdoc: out of bounds heap read and nullpointer / segfault

On domenica 25 novembre 2018 09:57:37 CET Hanno Böck wrote:
> I reported two memory safety bugs in the command line tool catdoc.
> However the mails to the developer bounced.
> 
> The first is an out of bounds heap read, to detect it catdoc needs to
> be compiled with address sanitizer (test it with -fsanitize=address in
> CFLAGS).
> 
> The second is a null pointer and will just crash catdoc.

Hi Hanno,

something about catdoc was already reported time ago:
https://marc.info/?l=oss-security&m=142627461816744&w=2

I don't know atm if your findings are duplicate or not.

-- 
Agostino Sarubbo
Gentoo Linux Developer


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.