Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <1d56e4c5-8d15-4642-b312-42ce0ad81b23@oracle.com>
Date: Fri, 4 Oct 2024 14:05:03 -0700
From: Alan Coopersmith <alan.coopersmith@...cle.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE-2024-42415: Integer Overflow in GNOME libgsf

On 10/4/24 13:59, Alan Coopersmith wrote:
> The upstream bug report is at https://gitlab.gnome.org/GNOME/libgsf/-/issues/34
> and states the bug is "Fixed in 1.14.53" and
> https://gitlab.gnome.org/GNOME/libgsf/-/ 
> commit/06d0cb92a4c02e7126ef2ff6f5e29fd74b4be9e0
> says it fixes that issue.

Oops, I should have noted the above bug report & commit also cover
CVE-2024-36474 from
https://talosintelligence.com/vulnerability_reports/TALOS-2024-2068

-- 
         -Alan Coopersmith-                 alan.coopersmith@...cle.com
          Oracle Solaris Engineering - https://blogs.oracle.com/solaris

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.