oss-sec mailing list archives
Re: CVE-2015-0848 - Heap overflow on libwmf0.2-7
From: cve-assign () mitre org
Date: Sun, 21 Jun 2015 07:08:32 -0400 (EDT)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
invalid read on meta_pen_create player/meta.h (+ patch) https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784205
heap-buffer-overflow READ of size 4 player/meta.h - while (objects[i].type && (i < NUM_OBJECTS (API))) i++; + while ((i < NUM_OBJECTS (API)) && objects[i].type) i++;
Use CVE-2015-4695.
wmf2gd/wmf2eps invalid read https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784192
wmf2gd/wmf2eps heap-use-after-free READ of size 4
Use CVE-2015-4696. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJVhprFAAoJEKllVAevmvmshbEIAIfLEYL/JRloei5vBHe0v3hm APMvwwLcDrJFZ1UHznIw3qk11YErS4HhPNsE8Y89ugTUbPAtKuL0iG/ymOCphZx6 M+0BJDkQvyrSxWzp/TO08UYtwLsyK67U7sh6CUoTC/Q3OBz15jA+7FmQ0tcH8VeF Gx+hu7a3HhSpsbq2gLFH9hWsMJj690OFpoAwqpXzd2T0yn6kIM7EhBc3fCSQp+A2 vKbVZTB6eBOfuf8A5CCCxaCXzGoO8dlQGGAo+XhzxFQARCObDw32u+vIZ9Q9KF2b +xrWvuXKB5q7QVp3IsYgPoE0BqXiEBTGyTPcv0yXPFgp13y4XJvalfmpbmL+vAo= =2Ssa -----END PGP SIGNATURE-----
Current thread:
- CVE-2015-0848 - Heap overflow on libwmf0.2-7 Fernando Muñoz (Jun 01)
- Re: CVE-2015-0848 - Heap overflow on libwmf0.2-7 Alessandro Ghedini (Jun 01)
- Re: CVE-2015-0848 - Heap overflow on libwmf0.2-7 Stefan Cornelius (Jun 03)
- Re: CVE-2015-0848 - Heap overflow on libwmf0.2-7 Stefan Cornelius (Jun 15)
- Re: CVE-2015-0848 - Heap overflow on libwmf0.2-7 cve-assign (Jun 15)
- Re: CVE-2015-0848 - Heap overflow on libwmf0.2-7 Fernando Muñoz (Jun 16)
- Re: CVE-2015-0848 - Heap overflow on libwmf0.2-7 cve-assign (Jun 21)